Sciweavers

PE
2006
Springer
91views Optimization» more  PE 2006»
14 years 11 days ago
Performance of peer-to-peer networks: Service capacity and role of resource sharing policies
In this paper we model and study the performance of peer-to-peer (P2P) file sharing systems in terms of their `service capacity'. We identify two regimes of interest: the tra...
Xiangying Yang, Gustavo de Veciana
PAAPP
2006
141views more  PAAPP 2006»
14 years 11 days ago
Algorithmic optimizations of a conjugate gradient solver on shared memory architectures
OpenMP is an architecture-independent language for programming in the shared memory model. OpenMP is designed to be simple and in terms of programming abstractions. Unfortunately,...
Henrik Löf, Jarmo Rantakokko
PR
2008
113views more  PR 2008»
14 years 12 days ago
Do unbalanced data have a negative effect on LDA?
For two-class discrimination, Ref. [1] claimed that, when covariance matrices of the two classes were unequal, a (class) unbalanced dataset had a negative effect on the performanc...
Jing-Hao Xue, D. Mike Titterington
ML
2006
ACM
109views Machine Learning» more  ML 2006»
14 years 12 days ago
Cost curves: An improved method for visualizing classifier performance
Abstract This paper introduces cost curves, a graphical technique for visualizing the performance (error rate or expected cost) of 2-class classifiers over the full range of possib...
Chris Drummond, Robert C. Holte
NETWORK
2008
119views more  NETWORK 2008»
14 years 12 days ago
Improving the Performance of Route Control Middleboxes in a Competitive Environment
Multihomed subscribers are increasingly adopting intelligent route control solutions to optimize the cost and end-to-end performance of the traffic routed among the different link...
Marcelo Yannuzzi, Xavier Masip-Bruin, Eva Mar&iacu...
JSS
2006
169views more  JSS 2006»
14 years 12 days ago
Comparison of performance of Web services, WS-Security, RMI, and RMI-SSL
This article analyses two most commonly used distributed models in Java: Web services and RMI (Remote Method Invocation). The paper focuses on regular (unsecured) as well as on se...
Matjaz B. Juric, Ivan Rozman, Bostjan Brumen, Matj...
JSAC
2006
100views more  JSAC 2006»
14 years 12 days ago
Measuring and Improving the Performance of Network Mobility Management in IPv6 Networks
Measuring the performance of an implementation of a set of protocols and analyzing the results is crucial to understanding the performance and limitations of the protocols in a rea...
Henrik Petander, Eranga Perera, Kun-Chan Lan, Arun...
JSAC
2006
130views more  JSAC 2006»
14 years 12 days ago
Performance Preserving Topological Downscaling of Internet-Like Networks
Abstract--The Internet is a large, heterogeneous system operating at very high speeds and consisting of a large number of users. Researchers use a suite of tools and techniques in ...
Fragkiskos Papadopoulos, Konstantinos Psounis, Ram...
JSAC
2006
103views more  JSAC 2006»
14 years 12 days ago
Performance analysis of M-ary PPM TH-UWB systems in the presence of MUI and timing jitter
The symbol error probability (SEP) performance of time-hopping (TH) ultra-wideband (UWB) systems in the presence of multiuser interference (MUI) and timing jitter is considered wit...
N. V. Kokkalis, P. Takis Mathiopoulos, George K. K...
JPDC
2006
112views more  JPDC 2006»
14 years 12 days ago
CEFT: A cost-effective, fault-tolerant parallel virtual file system
The vulnerability of computer nodes due to component failures is a critical issue for cluster-based file systems. This paper studies the development and deployment of mirroring in...
Yifeng Zhu, Hong Jiang