This site uses cookies to deliver our services and to ensure you get the best experience. By continuing to use this site, you consent to our use of cookies and acknowledge that you have read and understand our Privacy Policy, Cookie Policy, and Terms
BitTorrent (BT) has become an extremely popular and successful peer-to-peer (P2P) file sharing system. Although empirical evidence suggests that most nodes participate in multiple...
A key obstacle to large-scale network simulation over PC clusters is the memory balancing problem where a memory-overloaded machine can slow down an entire simulation due to disk ...
Lifetime of a wireless sensor network is affected by key factors such as network architecture, network size, sensor node population model, data generation rate, initial battery bu...
Anonymity protocols are a privacy-enhancing technology for Internet-based communication. Two important characteristics of anonymity protocols are the strength of anonymity provide...
Andreas Hirt, Michael J. Jacobson Jr., Carey L. Wi...
Obtaining representative and concise I/O workloads for the purpose of projecting the performance of storage systems remains a challenge due to the complex nature of I/O behaviors....
We present and validate an enhanced analytical queueing network model of zoned RAID. The model focuses on RAID levels 01 and 5, and yields the distribution of I/O request response...
Abigail S. Lebrecht, Nicholas J. Dingle, William J...
The increasing storage capacity and necessary redundancy of data centers and other large-scale IT facilities has drawn attention to the issue of reducing the power consumption of ...
Anthony Hylick, Ripduman Sohan, Andrew Rice, Brian...