Sciweavers

5687 search results - page 1114 / 1138
» Visualizing Evaluation in Scheme
Sort
View
153
Voted
NSDI
2007
15 years 6 months ago
Ricochet: Lateral Error Correction for Time-Critical Multicast
Ricochet is a low-latency reliable multicast protocol designed for time-critical clustered applications. It uses IP Multicast to transmit data and recovers from packet loss in end...
Mahesh Balakrishnan, Kenneth P. Birman, Amar Phani...
130
Voted
USENIX
2007
15 years 6 months ago
Load Shedding in Network Monitoring Applications
Monitoring and mining real-time network data streams is crucial for managing and operating data networks. The information that network operators desire to extract from the network...
Pere Barlet-Ros, Gianluca Iannaccone, Josep Sanju&...
145
Voted
USS
2008
15 years 6 months ago
Proactive Surge Protection: A Defense Mechanism for Bandwidth-Based Attacks
Large-scale bandwidth-based distributed denial-of-service (DDoS) attacks can quickly knock out substantial parts of a network before reactive defenses can respond. Even traffic flo...
Jerry Chi-Yuan Chou, Bill Lin, Subhabrata Sen, Oli...
138
Voted
ICDCS
2010
IEEE
15 years 5 months ago
RoLo: A Rotated Logging Storage Architecture for Enterprise Data Centers
Abstract—We propose RoLo (Rotated Logging), a new logging architecture for RAID10 systems for enhanced energy efficiency, performance and reliability. By spreading destaging I/O...
Yinliang Yue, Lei Tian, Hong Jiang, Fang Wang, Dan...
CCS
2008
ACM
15 years 5 months ago
Authenticated hash tables
Hash tables are fundamental data structures that optimally answer membership queries. Suppose a client stores n elements in a hash table that is outsourced at a remote server so t...
Charalampos Papamanthou, Roberto Tamassia, Nikos T...
« Prev « First page 1114 / 1138 Last » Next »