Sciweavers

190 search results - page 27 / 38
» Performance Evaluation of PIM-SM Recovery
Sort
View
ATAL
2008
Springer
13 years 9 months ago
The identification of users by relational agents
Virtual agents designed to establish relationships with more than one user must be able to identify and distinguish among those users with high reliability. We descr...
Daniel Schulman, Mayur Sharma, Timothy W. Bickmore
PVLDB
2010
184views more  PVLDB 2010»
13 years 6 months ago
Adaptive Logging for Mobile Device
Nowadays, due to the increased user requirements of the fast and reliable data management operation for mobile applications, major device vendors use embedded DBMS for their mobil...
Young-Seok Kim, Heegyu Jin, Kyoung-Gu Woo
STORAGESS
2006
ACM
14 years 1 months ago
Secure deletion myths, issues, and solutions
This paper has three goals. (1) We try to debunk several held misconceptions about secure deletion: that encryption is an ideal solution for everybody, that existing data-overwrit...
Nikolai Joukov, Harry Papaxenopoulos, Erez Zadok
CN
2002
120views more  CN 2002»
13 years 7 months ago
TCP-Real: receiver-oriented congestion control
We introduce a receiver-oriented approach to congestion control, demonstrated by an experimental protocol, TCP-Real. The protocol allows for a measurement-based transmission strate...
Vassilios Tsaoussidis, Chi Zhang
INFOCOM
2010
IEEE
13 years 6 months ago
A Balanced Consistency Maintenance Protocol for Structured P2P Systems
—A fundamental challenge of managing mutable data replication in a Peer-to-Peer (P2P) system is how to efficiently maintain consistency under various sharing patterns with heter...
Yi Hu, Min Feng, Laxmi N. Bhuyan