Sciweavers

124 search results - page 25 / 25
» An Analysis of the Degradation of Anonymous Protocols
Sort
View
PLDI
1998
ACM
13 years 9 months ago
The Implementation of the Cilk-5 Multithreaded Language
The fth release of the multithreaded language Cilk uses a provably good \work-stealing" scheduling algorithm similar to the rst system, but the language has been completely r...
Matteo Frigo, Charles E. Leiserson, Keith H. Randa...
CN
2007
99views more  CN 2007»
13 years 4 months ago
Mistreatment-resilient distributed caching
The distributed partitioning of autonomous, self-aware nodes into cooperative groups, within which scarce resources could be effectively shared for the benefit of the group, is ...
Georgios Smaragdakis, Nikolaos Laoutaris, Azer Bes...
CCR
2011
12 years 11 months ago
Two-way TCP connections: old problem, new insight
Many papers explain the drop of download performance when two TCP connections in opposite directions share a common bottleneck link by ACK compression, the phenomenon in which dow...
Martin Heusse, Sears A. Merritt, Timothy X. Brown,...
ISCA
2011
IEEE
333views Hardware» more  ISCA 2011»
12 years 8 months ago
The impact of memory subsystem resource sharing on datacenter applications
In this paper we study the impact of sharing memory resources on five Google datacenter applications: a web search engine, bigtable, content analyzer, image stitching, and protoc...
Lingjia Tang, Jason Mars, Neil Vachharajani, Rober...