Sciweavers

451 search results - page 74 / 91
» Object replication strategies in content distribution networ...
Sort
View
EUROPAR
2007
Springer
14 years 1 months ago
Esodyp+: Prefetching in the Jackal Software DSM
Abstract. Prefetching transfers a data item in advance from its storage location to its usage location so that communication is hidden and does not delay computation. We present a ...
Michael Klemm, Jean Christophe Beyler, Ronny T. La...
DSN
2008
IEEE
14 years 2 months ago
Evaluating email's feasibility for botnet command and control
The usefulness ofemail has been tempered by its role in the widespread distribution ofspam and malicious content. Security solutions have.focused on filtering out malicious payloa...
Kapil Singh, Abhinav Srivastava, Jonathon T. Giffi...
SIGMETRICS
2005
ACM
147views Hardware» more  SIGMETRICS 2005»
14 years 1 months ago
Denial-of-service resilience in peer-to-peer file sharing systems
Peer-to-peer (p2p) file sharing systems are characterized by highly replicated content distributed among nodes with enormous aggregate resources for storage and communication. Th...
Dan Dumitriu, Edward W. Knightly, Aleksandar Kuzma...
INTERNET
2010
132views more  INTERNET 2010»
13 years 4 months ago
Peer-to-Peer 3D Streaming
In multi-user networked virtual environments such as Second Life, 3D streaming techniques have been used to progressively download and render 3D objects and terrain, so that a ful...
Shun-Yun Hu, Jehn-Ruey Jiang, Bing-Yu Chen
CORR
1998
Springer
184views Education» more  CORR 1998»
13 years 7 months ago
Case Study in Survivable Network System Analysis
This paper presents a method for analyzing the survivability of distributed network systems and an example of its application. Survivability is the capability of a system to fulfi...
Robert J. Ellison, Richard C. Linger, Thomas A. Lo...