Sciweavers

2699 search results - page 403 / 540
» On Evaluating the Performance of Security Protocols
Sort
View
ANSS
2003
IEEE
14 years 3 months ago
Multicast Routing Simulator over MPLS Networks
Multicast and MPLS are two complementary technologies. Merging these two technologies where multicast trees are constructed over MPLS networks will enhance performance and present...
Ali Boudani, Bernard Cousin, Chadi Jawhar, Mahmoud...
ACMICEC
2003
ACM
125views ECommerce» more  ACMICEC 2003»
14 years 3 months ago
A heuristic bidding strategy for multiple heterogeneous auctions
Online auctions are increasingly being used as a medium to procure goods and services. As the number of auction sites increases, however, consumers will inevitably want to track a...
Patricia Anthony, Nicholas R. Jennings
AP2PC
2003
Springer
14 years 3 months ago
Incentive Mechanisms for Peer-to-Peer Systems
Abstract. Most of the existing research in peer-to-peer systems focuses on protocol design and doesn’t consider the rationality of each peer. One phenomenon that should not be ig...
Bin Yu, Munindar P. Singh
ARC
2009
Springer
134views Hardware» more  ARC 2009»
14 years 2 months ago
A HyperTransport 3 Physical Layer Interface for FPGAs
Abstract. This paper presents the very first implementation of a HyperTransport 3 physical layer interface for Field Programmable Gate Arrays. HyperTransport is a low latency, high...
Heiner Litz, Holger Fröning, Ulrich Brün...
HPCC
2009
Springer
14 years 2 months ago
C2Cfs: A Collective Caching Architecture for Distributed File Access
—In this paper we present C2Cfs - a decentralized collective caching architecture for distributed filesystems. C2Cfs diverges from the traditional client-server model and advoca...
Andrey Ermolinskiy, Renu Tewari