Sciweavers

5324 search results - page 1041 / 1065
» Internet Security Protocols
Sort
View
COMCOM
2004
98views more  COMCOM 2004»
13 years 7 months ago
End system multicast: an architectural infrastructure and topological optimization
Although IP-multicast has been proposed and investigated for years, there are major problems inherent in the IP-multicasting technique, e.g., difficulty to scale up the system, di...
Starsky H. Y. Wong, John C. S. Lui
CORR
2002
Springer
156views Education» more  CORR 2002»
13 years 7 months ago
Mapping the Gnutella Network: Properties of Large-Scale Peer-to-Peer Systems and Implications for System Design
Despite recent excitement generated by the peer-to-peer (P2P) paradigm and the surprisingly rapid deployment of some P2P applications, there are few quantitative evaluations of P2...
Matei Ripeanu, Ian T. Foster, Adriana Iamnitchi
DSS
2002
220views more  DSS 2002»
13 years 7 months ago
Past, present, and future of decision support technology
Since the early 1970s, decision support systems (DSS) technology and applications have evolved significantly. Many technological and organizational developments have exerted an im...
J. P. Shim, Merrill Warkentin, James F. Courtney, ...
TPDS
2010
116views more  TPDS 2010»
13 years 6 months ago
FS2You: Peer-Assisted Semipersistent Online Hosting at a Large Scale
—It has been widely acknowledged that online file hosting systems within the “cloud” of the Internet have provided valuable services to end users who wish to share files of a...
Fangming Liu, Ye Sun, Bo Li, Baochun Li, Xinyan Zh...
ANCS
2010
ACM
13 years 5 months ago
A new TCB cache to efficiently manage TCP sessions for web servers
TCP/IP, the most commonly used network protocol, consumes a significant portion of time in Internet servers. While a wide spectrum of studies has been done to reduce its processin...
Guangdeng Liao, Laxmi N. Bhuyan, Wei Wu, Heeyeol Y...
« Prev « First page 1041 / 1065 Last » Next »