Sciweavers

SIGMETRICS
2008
ACM
138views Hardware» more  SIGMETRICS 2008»
15 years 2 months ago
Utility maximization in peer-to-peer systems
In this paper, we study the problem of utility maximization in P2P systems, in which aggregate application-specific utilities are maximized by running distributed algorithms on P2...
Minghua Chen, Miroslav Ponec, Sudipta Sengupta, Ji...
108
Voted
SIGMETRICS
2008
ACM
15 years 2 months ago
Managing inter-domain traffic in the presence of bittorrent file-sharing
Overlay routing operating in a selfish manner is known to cause undesired instability when it interacts with native layer routing. We observe similar selfish behavior with the Bit...
Srinivasan Seetharaman, Mostafa H. Ammar
113
Voted
CONEXT
2009
ACM
15 years 3 months ago
Networking named content
Network use has evolved to be dominated by content distribution and retrieval, while networking technology still speaks only of connections between hosts. Accessing content and se...
Van Jacobson, Diana K. Smetters, James D. Thornton...
101
Voted
CONEXT
2005
ACM
15 years 4 months ago
Increasing the determinism of network emulation to evaluate communication protocols
In this paper, we propose an emulation solution whose purpose is to deal with the need of reproducibility that is encountered in communication protocols evaluation and transport p...
Emmanuel Conchon, Johan Garcia
109
Voted
EMSOFT
2006
Springer
15 years 6 months ago
Real-time interfaces for composing real-time systems
Recently, a number of frameworks were proposed to extend interface theory to the domains of single-processor and distributed real-time systems. This paper unifies some of these ap...
Lothar Thiele, Ernesto Wandeler, Nikolay Stoimenov
123
Voted
EMSOFT
2006
Springer
15 years 6 months ago
Time-triggered implementations of dynamic controllers
Bridging the gap between model-based design and platformbased implementation is one of the critical challenges for embedded software systems. In the context of embedded control sy...
Truong Nghiem, George J. Pappas, Rajeev Alur, Anto...
125
Voted
DEBS
2007
ACM
15 years 6 months ago
Concepts and models for typing events for event-based systems
Event-based systems are increasingly gaining widespread attention for applications that require integration with loosely coupled and distributed systems for time-critical business...
Szabolcs Rozsnyai, Josef Schiefer, Alexander Schat...
138
Voted
ISLPED
2003
ACM
197views Hardware» more  ISLPED 2003»
15 years 7 months ago
Analyzing the energy consumption of security protocols
Security is critical to a wide range of wireless data applications and services. While several security mechanisms and protocols have been developed in the context of the wired In...
Nachiketh R. Potlapally, Srivaths Ravi, Anand Ragh...
92
Voted
PASTE
2004
ACM
15 years 8 months ago
The design and implementation of FIT: a flexible instrumentation toolkit
This paper presents FIT, a Flexible open-source binary code Instrumentation Toolkit. Unlike existing tools, FIT is truly portable, with existing backends for the Alpha, x86 and AR...
Bruno De Bus, Dominique Chanet, Bjorn De Sutter, L...
120
Voted
NETGAMES
2004
ACM
15 years 8 months ago
Implementation of a service platform for online games
Large-scale multiplayer online games require considerable investment in hosting infrastructures. However, the difficulty of predicting the success of a new title makes investing ...
Anees Shaikh, Sambit Sahu, Marcel-Catalin Rosu, Mi...