Sciweavers

NCA
2006
IEEE
13 years 10 months ago
Congestion Control for Distributed Hash Tables
Distributed Hash Tables (DHTs) provide a scalable mechanism for mapping identifiers to socket addresses. As each peer in the network can initiate lookup requests, a DHT has to pr...
Fabius Klemm, Jean-Yves Le Boudec, Karl Aberer
NCA
2006
IEEE
13 years 10 months ago
A Tree-Turn Model for Irregular Networks
Jiazheng Zhou, Xuan-Yi Lin, Yeh-Ching Chung
NCA
2006
IEEE
13 years 10 months ago
Network-Aware Adaptation Techniques for Mobile File Systems
Wireless networks present unusual challenges for mobile file system clients, since they are characterised by unpredictable connectivity and widely-varying bandwidth. The traditio...
Benjamin Atkin, Kenneth P. Birman
NCA
2006
IEEE
13 years 10 months ago
Improved Result Ranking in P2P File-Sharing Systems by Probing for Metadata
One of the reasons that search performance of peerto-peer file-sharing systems is poor is that results are poorly described, hurting the client’s ability to rank them. This is a...
Wai Gen Yee, Linh Thai Nguyen, Ophir Frieder
NCA
2006
IEEE
13 years 10 months ago
Experience with some Principles for Building an Internet-Scale Reliable System
We discuss the design methodology used to achieve commercial-quality reliability in the Akamai content delivery network. The network consists of 15,000+ servers in 1,100+ networks...
Mike Afergan
NCA
2006
IEEE
13 years 10 months ago
JetStream: Achieving Predictable Gossip Dissemination by Leveraging Social Network Principles
Gossip protocols provide probabilistic reliability and scalability, but their inherent randomness may lead to high variation in number of messages that are received at different n...
Jay A. Patel, Indranil Gupta, Noshir S. Contractor