Sciweavers

673 search results - page 112 / 135
» Request behavior variations
Sort
View
SIGCOMM
1997
ACM
13 years 11 months ago
End-to-end Internet Packet Dynamics
We discuss findings from a large-scale study of Internet packet dynamics conducted by tracing 20,000 TCP bulk transfers between 35 Internet sites. Because we traced each 100 Kbyt...
Vern Paxson
ATAL
2006
Springer
13 years 11 months ago
Learning trust strategies in reputation exchange networks
An agent's trust decision strategy consists of the agent's policies for making trust-related decisions, such as who to trust, how trustworthy to be, what reputations to ...
Karen Fullam, K. Suzanne Barber
DAGM
2006
Springer
13 years 11 months ago
Diffusion-Like Reconstruction Schemes from Linear Data Models
In this paper we extend anisotropic diffusion with a diffusion tensor to be applicable to data that is well modeled by linear models. We focus on its variational theory, and invest...
Hanno Scharr
ARVLSI
2001
IEEE
305views VLSI» more  ARVLSI 2001»
13 years 11 months ago
Logic Design Considerations for 0.5-Volt CMOS
As the operating supply voltage for commercial CMOS devices falls below 2 V, research activities are underway to develop CMOS integrated circuits that can operate at supply voltag...
K. Joseph Hass, Jack Venbrux, Prakash Bhatia
ISCA
1998
IEEE
135views Hardware» more  ISCA 1998»
13 years 11 months ago
Branch Prediction Based on Universal Data Compression Algorithms
Data compression and prediction are closely related. Thus prediction methods based on data compression algorithms have been suggested for the branch prediction problem. In this wo...
Eitan Federovsky, Meir Feder, Shlomo Weiss