Sciweavers

317 search results - page 41 / 64
» Who gives a tweet
Sort
View
PE
2006
Springer
91views Optimization» more  PE 2006»
13 years 8 months ago
Performance of peer-to-peer networks: Service capacity and role of resource sharing policies
In this paper we model and study the performance of peer-to-peer (P2P) file sharing systems in terms of their `service capacity'. We identify two regimes of interest: the tra...
Xiangying Yang, Gustavo de Veciana
IMCS
2007
78views more  IMCS 2007»
13 years 8 months ago
Usable set-up of runtime security policies
Setting up runtime security policies as required for firewalls or as envisioned by policy languages for the Semantic Web is a difficult task, especially for lay users who have l...
Almut Herzog, Nahid Shahmehri
CAD
2004
Springer
13 years 8 months ago
Teaching meshes, subdivision and multiresolution techniques
In recent years, geometry processing algorithms that directly operate on polygonal meshes have become an indispensable tool in computer graphics, CAD/CAM applications, numerical s...
Stephan Bischoff, Leif Kobbelt
EATCS
2000
85views more  EATCS 2000»
13 years 8 months ago
A New Zero-One Law and Strong Extension Axioms
One of the previous articles in this column was devoted to the zero-one laws for a number of logics playing prominent role in finite model theory: first-order logic FO, the extens...
Andreas Blass, Yuri Gurevich
SIGMETRICS
2000
ACM
13 years 8 months ago
Minimizing the impact of orphan requests in e-commerce services
The most common problem of an overloaded electronic-commerce server is an increase in the response time perceived by customers, who may restart their requests hoping to get a fast...
E. Kraemer, Goedson T. Paixão, Dorgival Ola...