Sciweavers

190 search results - page 6 / 38
» Performance Evaluation of PIM-SM Recovery
Sort
View
WSC
2007
13 years 10 months ago
Bi-criteria evaluation of an outpatient procedure center via simulation
Surgical services require the coordination of many activities, including patient check-in and surgical preparation, surgery, and recovery after surgery. Each of these activities r...
Todd R. Huschka, Brian T. Denton, Serhat Gul, John...
BROADNETS
2005
IEEE
14 years 1 months ago
Modeling and performance evaluation of ISCSI storage area networks
Abstract— This paper provides a concise modeling and performance evaluation of the iSCSI storage area network (SAN) architecture and protocol. SANs play a key role in business co...
Christoph M. Gauger, Martin Köhn, Sebastian G...
ACMACE
2006
ACM
14 years 1 months ago
An empirical evaluation of TCP performance in online games
A fundamental design question to ask in the development of a network game is—Which transport protocol should be used—TCP, UDP, or some other protocols? Seeking an objective an...
Kuan-Ta Chen, Chun-Ying Huang, Polly Huang, Chin-L...
FTCS
1993
123views more  FTCS 1993»
13 years 9 months ago
Fast, On-Line Failure Recovery in Redundant Disk Arrays
This paper describes and evaluates two algorithms for performing on-line failure recovery (data reconstruction) in redundant disk arrays. It presents an implementation of disk-ori...
Mark Holland, Garth A. Gibson, Daniel P. Siewiorek
FAST
2008
13 years 10 months ago
SWEEPER: An Efficient Disaster Recovery Point Identification Mechanism
Data corruption is one of the key problems that is on top of the radar screen of most CIOs. Continuous Data Protection (CDP) technologies help enterprises deal with data corruptio...
Akshat Verma, Kaladhar Voruganti, Ramani Routray, ...