Sciweavers

73 search results - page 11 / 15
» Networks on Silicon: Combining Best-Effort and Guaranteed Se...
Sort
View
IPPS
2005
IEEE
14 years 1 months ago
Securely Replicated Web Documents
In order to achieve better scalability and reduce latency in handling user requests, many Web applications make extensive use of data replication through caches and Content Delive...
Bogdan C. Popescu, Maarten van Steen, Bruno Crispo...
PERCOM
2006
ACM
14 years 7 months ago
Ordering Management Actions in Pervasive Systems using Specification-enhanced Policies
A pervasive system features a plethora of devices, services and applications organized as a large distributed system. One approach to managing such systems is by policies where ad...
Chetan Shiva Shankar, Roy H. Campbell
PDPTA
2004
13 years 9 months ago
Achieving Flow Level QoS in Cut-Through Networks Through Admission Control and DiffServ
Cluster networks will serve as the future access networks for multimedia streaming, massive multiplayer online gaming, e-commerce, network storage etc. And for those application ar...
Frank Olaf Sem-Jacobsen, Sven-Arne Reinemo, Tor Sk...
SOSP
2001
ACM
14 years 4 months ago
Building a Robust Software-Based Router Using Network Processors
Recent efforts to add new services to the Internet have increased interest in software-based routers that are easy to extend and evolve. This paper describes our experiences using...
Tammo Spalink, Scott Karlin, Larry L. Peterson, Yi...
GLOBE
2009
Springer
14 years 14 days ago
Protecting Data Privacy in Structured P2P Networks
P2P systems are increasingly used for efficient, scalable data sharing. Popular applications focus on massive file sharing. However, advanced applications such as online communiti...
Mohamed Jawad, Patricia Serrano-Alvarado, Patrick ...