Sciweavers

1872 search results - page 174 / 375
» Unbalanced Cache Systems
Sort
View
INFOCOM
2012
IEEE
12 years 1 months ago
Pssst, over here: Communicating without fixed infrastructure
—This paper discusses a way to communicate without relying on fixed infrastructure at some central hub. This can be useful for bootstrapping loosely connected peer-to-peer syste...
Tom Callahan, Mark Allman, Michael Rabinovich
CIKM
2007
Springer
14 years 4 months ago
Optimal proactive caching in peer-to-peer network: analysis and application
As a promising new technology with the unique properties like high efficiency, scalability and fault tolerance, Peer-toPeer (P2P) technology is used as the underlying network to b...
Weixiong Rao, Lei Chen 0002, Ada Wai-Chee Fu, Ying...
WWW
2006
ACM
14 years 11 months ago
Invasive browser sniffing and countermeasures
We describe the detrimental effects of browser cache/history sniffing in the context of phishing attacks, and detail an approach that neutralizes the threat by means of URL person...
Markus Jakobsson, Sid Stamm
ECMAST
1999
Springer
142views Multimedia» more  ECMAST 1999»
14 years 2 months ago
Enabling Flexible Services Using XML Metadata
Combining eXtensible Markup Language (XML) and Active Layer Networking may yield strong benefits for networked services. A Wide range of new Multimedia applications can be develope...
Luis Velasco, Ian Marshall
NA
2010
87views more  NA 2010»
13 years 9 months ago
A note on the O(n)-storage implementation of the GKO algorithm and its adaptation to Trummer-like matrices
We propose a new O(n)-space implementation of the GKO-Cauchy algorithm for the solution of linear systems where the coefficient matrix is Cauchy-like. Moreover, this new algorithm...
Federico Poloni