Sciweavers

1816 search results - page 245 / 364
» Trace oblivious computation
Sort
View
ICDCS
2007
IEEE
14 years 3 months ago
A Multiphased Approach for Modeling and Analysis of the BitTorrent Protocol
BitTorrent is one of the most popular protocols for content distribution and accounts for more than 15% of the total Internet traffic. In this paper, we present an analytical mod...
Vivek Rai, Swaminathan Sivasubramanian, Sandjai Bh...
ICDCS
2007
IEEE
14 years 3 months ago
Non-Threshold based Event Detection for 3D Environment Monitoring in Sensor Networks
Event detection is a crucial task for wireless sensor network applications, especially environment monitoring. Existing approaches for event detection are mainly based on some pre...
Mo Li, Yunhao Liu, Lei Chen 0002
ICDCS
2007
IEEE
14 years 3 months ago
Defragmenting DHT-based Distributed File Systems
Existing DHT-based file systems use consistent hashing to assign file blocks to random machines. As a result, a user task accessing an entire file or multiple files needs to r...
Jeffrey Pang, Phillip B. Gibbons, Michael Kaminsky...
ICPP
2007
IEEE
14 years 3 months ago
SOR: A Static File Assignment Strategy Immune to Workload Characteristic Assumptions in Parallel I/O Systems
The problem of statically assigning nonpartitioned files in a parallel I/O system has been extensively investigated. A basic workload characteristic assumption of existing solutio...
Tao Xie 0004
ICPPW
2007
IEEE
14 years 3 months ago
A Measurement of a large-scale Peer-to-Peer Live Video Streaming System
— Peer-to-Peer (P2P) technologies have found much success in applications like file distributions, and its adoption in live video streaming has recently attracted significant a...
Susu Xie, Gabriel Yik Keung, Bo Li