Sciweavers

858 search results - page 81 / 172
» Sharing the Cost of a Capacity Network
Sort
View
USENIX
2007
13 years 11 months ago
A Comparison of Structured and Unstructured P2P Approaches to Heterogeneous Random Peer Selection
Random peer selection is used by numerous P2P applications; examples include application-level multicast, unstructured file sharing, and network location mapping. In most of thes...
Vivek Vishnumurthy, Paul Francis
OSDI
2004
ACM
14 years 9 months ago
Energy-Efficiency and Storage Flexibility in the Blue File System
A fundamental vision driving pervasive computing research is access to personal and shared data anywhere at anytime. In many ways, this vision is close to being realized. Wireless...
Edmund B. Nightingale, Jason Flinn
MICRO
2006
IEEE
145views Hardware» more  MICRO 2006»
14 years 3 months ago
ASR: Adaptive Selective Replication for CMP Caches
The large working sets of commercial and scientific workloads stress the L2 caches of Chip Multiprocessors (CMPs). Some CMPs use a shared L2 cache to maximize the on-chip cache c...
Bradford M. Beckmann, Michael R. Marty, David A. W...
BROADNETS
2006
IEEE
14 years 28 days ago
On Traffic Grooming Choices for IP over WDM networks
Traffic grooming continues to be a rich area of research in the context of WDM optical networks. We provide an overview of the optical and electronic grooming techniques available...
Srivatsan Balasubramanian, Arun K. Somani
JASIS
2008
76views more  JASIS 2008»
13 years 9 months ago
Using importance flooding to identify interesting networks of criminal activity
Abstract. In spite of policy concerns and high costs, the law enforcement community is investing heavily in data sharing initiatives. Cross-jurisdictional criminal justice informat...
Byron Marshall, Hsinchun Chen, Siddharth Kaza