Sciweavers

1101 search results - page 182 / 221
» Reliability for Networked Storage Nodes
Sort
View
TON
2002
138views more  TON 2002»
13 years 7 months ago
Single-packet IP traceback
The design of the IP protocol makes it difficult to reliably identify the originator of an IP packet. Even in the absence of any deliberate attempt to disguise a packet's orig...
Alex C. Snoeren, Craig Partridge, Luis A. Sanchez,...
SIGSOFT
2010
ACM
13 years 5 months ago
Multiplicity computing: a vision of software engineering for next-generation computing platform applications
New technologies have recently emerged to challenge the very nature of computing: multicore processors, virtualized operating systems and networks, and data-center clouds. One can...
Cristian Cadar, Peter Pietzuch, Alexander L. Wolf
DSN
2011
IEEE
12 years 7 months ago
Coercing clients into facilitating failover for object delivery
Abstract—Application-level protocols used for object delivery, such as HTTP, are built atop TCP/IP and inherit its hostabstraction. Given that these services are replicated for s...
Wyatt Lloyd, Michael J. Freedman
NOMS
2008
IEEE
139views Communications» more  NOMS 2008»
14 years 2 months ago
Fast similarity search in peer-to-peer networks
Abstract—Peer-to-peer (P2P) systems show numerous advantages over centralized systems, such as load balancing, scalability, and fault tolerance, and they require certain function...
Thomas Bocek, Ela Hunt, David Hausheer, Burkhard S...
SIGMETRICS
2008
ACM
161views Hardware» more  SIGMETRICS 2008»
13 years 7 months ago
Bound analysis of closed queueing networks with workload burstiness
Burstiness and temporal dependence in service processes are often found in multi-tier architectures and storage devices and must be captured accurately in capacity planning models...
Giuliano Casale, Ningfang Mi, Evgenia Smirni