Sciweavers

71 search results - page 8 / 15
» Modeling, Analysis and Improvement for BitTorrent-Like File ...
Sort
View
AINA
2007
IEEE
14 years 1 months ago
Heuristics for Improving Cryptographic Key Assignment in a Hierarchy
In hierarchical distributed systems, shared data access can be controlled by assigning user groups single cryptographic keys that allow high level users derive low level keys, but...
Anne V. D. M. Kayem, Patrick Martin, Selim G. Akl
IPPS
2006
IEEE
14 years 1 months ago
Improving cooperation in peer-to-peer systems using social networks
Rational and selfish nodes in P2P systems usually lack effective incentives to cooperate, contributing to the increase of free-riders, and degrading the system performance. Variou...
Wenyu Wang, Li Zhao, Ruixi Yuan
ICCNMC
2005
Springer
14 years 24 days ago
Modeling and Performance Evaluation of Handover Service in Wireless Networks
With the development of wireless network, more and more applications require the QoS for message transmission. In order to enhance the QoS service in the dynamic changing wireless ...
Wenfeng Du, Lidong Lin, Weijia Jia, Guojun Wang
ESEM
2010
ACM
13 years 5 months ago
Strengthening the empirical analysis of the relationship between Linus' Law and software security
Open source software is often considered to be secure because large developer communities can be leveraged to find and fix security vulnerabilities. Eric Raymond states Linus’ L...
Andrew Meneely, Laurie A. Williams
SIGMETRICS
2011
ACM
237views Hardware» more  SIGMETRICS 2011»
12 years 10 months ago
Analysis of DCTCP: stability, convergence, and fairness
Cloud computing, social networking and information networks (for search, news feeds, etc) are driving interest in the deployment of large data centers. TCP is the dominant Layer 3...
Mohammad Alizadeh, Adel Javanmard, Balaji Prabhaka...