Sciweavers

3719 search results - page 710 / 744
» order 2010
Sort
View
NA
2010
85views more  NA 2010»
13 years 8 months ago
The reliability/cost trade-off for a class of ODE solvers
In the numerical solution of ODEs, it is now possible to develop efficient techniques that will deliver approximate solutions that are piecewise polynomials. The resulting methods...
Wayne H. Enright, Li Yan
NETWORKING
2010
13 years 8 months ago
Speculative Validation of Web Objects for Further Reducing the User-Perceived Latency
Web caching techniques reduce user-perceived latency by serving the most popular web objects from an intermediate memory. In order to assure that reused objects are not stale, cond...
Josep Domènech, José A. Gil, Julio S...
NOSSDAV
2010
Springer
13 years 8 months ago
Designing a tit-for-tat based peer-to-peer video-on-demand system
Video-on-demand (VoD) is a next-generation Internet application of increasing interest allowing users to start watching a movie almost instantaneously by downloading the video on-...
Kévin Huguenin, Anne-Marie Kermarrec, Vivek...
OOPSLA
2010
Springer
13 years 8 months ago
Ownership and immutability in generic Java
The Java language lacks the important notions of ownership (an object owns its representation to prevent unwanted aliasing) and immutability (the division into mutable, immutable,...
Yoav Zibin, Alex Potanin, Paley Li, Mahmood Ali, M...
P2P
2010
IEEE
132views Communications» more  P2P 2010»
13 years 8 months ago
Towards Plugging Privacy Leaks in the Domain Name System
—Privacy leaks are an unfortunate and an integral part of the current Internet domain name resolution. Each DNS query generated by a user reveals – to one or more DNS servers ...
Yanbin Lu, Gene Tsudik