Sciweavers

35419 search results - page 47 / 7084
» How are we doing
Sort
View
P2P
2010
IEEE
187views Communications» more  P2P 2010»
13 years 7 months ago
Do BitTorrent-Like VoD Systems Scale under Flash-Crowds?
—The efficiency of BitTorrent for file sharing has inspired a number of BitTorrent-based P2P protocols for Videoon-Demand (VoD). It has been shown that these systems are scalab...
Lucia D'Acunto, Tamas Vinko, Johan A. Pouwelse
ISPEC
2007
Springer
14 years 2 months ago
An Economical Model for the Risk Evaluation of DoS Vulnerabilities in Cryptography Protocols
Denial of Service (DoS) attacks are a virulent type of attack on the availability of networks’ intended services and resources. Defense against DoS attacks has been built into th...
Zhen Cao, Zhi Guan, Zhong Chen, Jian-bin Hu, Liyon...
CASES
2001
ACM
14 years 5 days ago
The emerging power crisis in embedded processors: what can a poor compiler do?
It is widely acknowledged that even as VLSI technology advances, there is a looming crisis that is an important obstacle to the widespread deployment of mobile embedded devices, n...
Lakshmi N. Chakrapani, Pinar Korkmaz, Vincent John...
JOT
2007
170views more  JOT 2007»
13 years 8 months ago
Enough of Processes - Lets do Practices
All modern software development processes try to help project teams conduct their work. While there are some important differences between them, the commonalities are far greater ...
Ivar Jacobson, Pan Wei Ng, Ian Spence
GECCO
2007
Springer
136views Optimization» more  GECCO 2007»
14 years 2 months ago
Do additional objectives make a problem harder?
In this paper, we examine how adding objectives to a given optimization problem affects the computation effort required to generate the set of Pareto-optimal solutions. Experime...
Dimo Brockhoff, Tobias Friedrich, Nils Hebbinghaus...