Sciweavers

11215 search results - page 2104 / 2243
» Skeleton - Easy Simulation System
Sort
View
SIGCOMM
2004
ACM
14 years 4 months ago
A wavelet-based approach to detect shared congestion
Per-flow congestion control helps endpoints fairly and efficiently share network resources. Better utilization of network resources can be achieved, however, if congestion manag...
Min Sik Kim, Taekhyun Kim, YongJune Shin, Simon S....
CIKM
2004
Springer
14 years 4 months ago
The robustness of content-based search in hierarchical peer to peer networks
Hierarchical peer to peer networks with multiple directory services are an important architecture for large-scale file sharing due to their effectiveness and efficiency. Recent ...
M. Elena Renda, Jamie Callan
WCW
2004
Springer
14 years 4 months ago
An Empirical Study of a Segment-Based Streaming Proxy in an Enterprise Environment
Abstract. Streaming media workloads have a number of desirable properties that make them good candidates for caching via proxy systems. The content does not get modified, and acce...
Sumit Roy, Bo Shen, Songqing Chen, Xiaodong Zhang
ETRA
2010
ACM
178views Biometrics» more  ETRA 2010»
14 years 4 months ago
Biometric identification via an oculomotor plant mathematical model
There has been increased interest in reliable, non-intrusive methods of biometric identification due to the growing emphasis on security and increasing prevalence of identity thef...
Oleg V. Komogortsev, Sampath Jayarathna, Cecilia R...
ICNP
2003
IEEE
14 years 4 months ago
RR-TCP: A Reordering-Robust TCP with DSACK
TCP performs poorly on paths that reorder packets significantly, where it misinterprets out-of-order delivery as packet loss. The sender responds with a fast retransmit though no...
Ming Zhang, Brad Karp, Sally Floyd, Larry L. Peter...
« Prev « First page 2104 / 2243 Last » Next »