Sciweavers

464 search results - page 84 / 93
» Identity Management for Self-Portrayal
Sort
View
ISCC
2002
IEEE
122views Communications» more  ISCC 2002»
14 years 8 days ago
Efficiency/friendliness tradeoffs in TCP Westwood
In this paper, we propose a refinement of TCP Westwood allowing the management of the Efficiency/Friendliness-toNewReno tradeoff. We show that the refined TCP Westwood is able to ...
Ren Wang, Massimo Valla, M. Y. Sanadidi, Bryan K. ...
MOBICOM
2010
ACM
13 years 7 months ago
Privacy vulnerability of published anonymous mobility traces
Mobility traces of people and vehicles have been collected and published to assist the design and evaluation of mobile networks, such as large-scale urban sensing networks. Althou...
Chris Y. T. Ma, David K. Y. Yau, Nung Kwan Yip, Na...
IOR
2007
65views more  IOR 2007»
13 years 7 months ago
A Comparison of the Optimal Costs of Two Canonical Inventory Systems
We compare two inventory systems, one in which excess demand is lost and the other in which excess demand is backordered. Both systems are reviewed periodically. They experience t...
Ganesh Janakiraman, Sridhar Seshadri, J. George Sh...
ICS
1999
Tsinghua U.
13 years 11 months ago
Symmetry and performance in consistency protocols
A consistency protocol can be termed symmetric if all processors are treated identically when they access common resources. By contrast, asymmetric protocols usually assign a home...
Peter J. Keleher
DOOD
1989
Springer
146views Database» more  DOOD 1989»
13 years 11 months ago
The Object-Oriented Database System Manifesto
This paper attempts to de ne an object-oriented database system. It describes the main features and characteristics that a system must have to qualify as an objectoriented databas...
Malcolm P. Atkinson, François Bancilhon, Da...