Sciweavers

1251 search results - page 250 / 251
» Using Semantics for Resource Allocation in Computing Service...
Sort
View
BROADNETS
2005
IEEE
13 years 11 months ago
Modeling and performance evaluation of ISCSI storage area networks
Abstract— This paper provides a concise modeling and performance evaluation of the iSCSI storage area network (SAN) architecture and protocol. SANs play a key role in business co...
Christoph M. Gauger, Martin Köhn, Sebastian G...
SIGCOMM
1999
ACM
13 years 10 months ago
Load-Sensitive Routing of Long-Lived IP Flows
Internet service providers face a daunting challenge in provisioning network resources, due to the rapid growth of the Internet and wide fluctuations in the underlying traffic pa...
Anees Shaikh, Jennifer Rexford, Kang G. Shin
ACNS
2006
Springer
87views Cryptology» more  ACNS 2006»
13 years 9 months ago
Effect of Malicious Synchronization
Abstract. We study the impact of malicious synchronization on computer systems that serve customers periodically. Systems supporting automatic periodic updates are common in web se...
Mun Choon Chan, Ee-Chien Chang, Liming Lu, Peng So...
GIS
2002
ACM
13 years 5 months ago
Remote access to large spatial databases
Enterprises in the public and private sectors have been making their large spatial data archives available over the Internet. However, interactive work with such large volumes of ...
Egemen Tanin, Frantisek Brabec, Hanan Samet
JCIT
2007
132views more  JCIT 2007»
13 years 5 months ago
Analysis and Implementation of M-commerce in Education for Developing Countries (Uzbekistan case)
M-commerce is one of the ways IT can significantly contribute to boosting economy of the developing countries. M-commerce project has a high potential in the developing countries ...
Olga Yugay, Aleksey Semyonov, Il Seok Ko, Sarvar R...