Sciweavers

451 search results - page 70 / 91
» Object replication strategies in content distribution networ...
Sort
View
WWW
2002
ACM
14 years 8 months ago
Flash crowds and denial of service attacks: characterization and implications for CDNs and web sites
The paper studies two types of events that often overload Web sites to a point when their services are degraded or disrupted entirely - flash events (FEs) and denial of service at...
Jaeyeon Jung, Balachander Krishnamurthy, Michael R...
LCN
2008
IEEE
14 years 2 months ago
Range queries and load balancing in a hierarchically structured P2P system
—Structured Peer-to-Peer (P2P) systems are highly scalable, self-organizing, and support efficient lookups. Furthermore, Distributed Hash Tables (DHTs), due to their features, a...
Simon Rieche, Bui The Vinh, Klaus Wehrle
ICDE
2005
IEEE
110views Database» more  ICDE 2005»
14 years 1 months ago
Locality Aware Networked Join Evaluation
We pose the question: how do we efficiently evaluate a join operator, distributed over a heterogeneous network? Our objective here is to optimize the delay of output tuples. We di...
Yanif Ahmad, Ugur Çetintemel, John Jannotti...
SENSYS
2005
ACM
14 years 1 months ago
Intelligent light control using sensor networks
Increasing user comfort and reducing operation costs have always been two primary objectives of building operations and control strategies. Current building control strategies are...
Vipul Singhvi, Andreas Krause, Carlos Guestrin, Ja...
P2P
2007
IEEE
14 years 1 months ago
Rescuing Tit-for-Tat with Source Coding
Tit-for-tat is widely believed to be the most effective strategy to enforce collaboration among selfish users. However, it has been shown that its usefulness for decentralized an...
Thomas Locher, Stefan Schmid, Roger Wattenhofer