Sciweavers

2904 search results - page 534 / 581
» Internet Infrastructure Security
Sort
View
CORR
2002
Springer
156views Education» more  CORR 2002»
13 years 8 months ago
Mapping the Gnutella Network: Properties of Large-Scale Peer-to-Peer Systems and Implications for System Design
Despite recent excitement generated by the peer-to-peer (P2P) paradigm and the surprisingly rapid deployment of some P2P applications, there are few quantitative evaluations of P2...
Matei Ripeanu, Ian T. Foster, Adriana Iamnitchi
SIGMETRICS
2000
ACM
144views Hardware» more  SIGMETRICS 2000»
13 years 8 months ago
Bistro: a framework for building scalable wide-area Upload applications
Hot spots are a major obstacle to achieving scalability in the Internet. At the application layer, hot spots are usually caused by either (a) high demand for some data or (b) high...
Samrat Bhattacharjee, William C. Cheng, Cheng-Fu C...
TON
2002
116views more  TON 2002»
13 years 8 months ago
Managing capacity for telecommunications networks under uncertainty
The existing telecommunications infrastructure in most of the world is adequate to deliver voice and text applications, but demand for broadband services such as streaming video an...
Yann d'Halluin, Peter A. Forsyth, Kenneth R. Vetza...
IJESMA
2010
136views more  IJESMA 2010»
13 years 6 months ago
Understanding Shared Services: An Exploration of the IS Literature
In a competitive environment, companies continuously innovate to offer superior services at lower costs. `Shared services' have been extensively adopted in practice as one me...
Suraya Miskon, Wasana Bandara, Erwin Fielt, Guy G....
CORR
2010
Springer
151views Education» more  CORR 2010»
13 years 5 months ago
Selective Call Out and Real Time Bidding
Display ads on the Internet are increasingly sold via ad exchanges such as RightMedia, AdECN and Doubleclick Ad Exchange. These exchanges allow real-time bidding, that is, each ti...
Tanmoy Chakraborty, Eyal Even-Dar, Sudipto Guha, Y...