Sciweavers

286 search results - page 42 / 58
» An analytical model for cache replacement policy performance
Sort
View
SIGMETRICS
2008
ACM
119views Hardware» more  SIGMETRICS 2008»
14 years 11 months ago
Analysis of bittorrent-like protocols for on-demand stored media streaming
This paper develops analytic models that characterize the behavior of on-demand stored media content delivery using BitTorrent-like protocols. The models capture the effects of di...
Nadim Parvez, Carey L. Williamson, Anirban Mahanti...
MOBIHOC
2003
ACM
15 years 10 months ago
PATHS: analysis of PATH duration statistics and their impact on reactive MANET routing protocols
We develop a detailed approach to study how mobilityimpacts the performance of reactive MANET routing protocols. In particular we examine how the statistics of path durations inclu...
Narayanan Sadagopan, Fan Bai, Bhaskar Krishnamacha...
ATAL
2010
Springer
15 years 4 days ago
Strategy exploration in empirical games
Empirical analyses of complex games necessarily focus on a restricted set of strategies, and thus the value of empirical game models depends on effective methods for selectively e...
Patrick R. Jordan, L. Julian Schvartzman, Michael ...
SP
2005
IEEE
149views Security Privacy» more  SP 2005»
15 years 4 months ago
Distributed Proving in Access-Control Systems
We present a distributed algorithm for assembling a proof that a request satisfies an access-control policy expressed in a formal logic, in the tradition of Lampson et al. [16]. ...
Lujo Bauer, Scott Garriss, Michael K. Reiter
108
Voted
SIGMOD
2004
ACM
173views Database» more  SIGMOD 2004»
15 years 11 months ago
Relaxed Currency and Consistency: How to Say "Good Enough" in SQL
Despite the widespread and growing use of asynchronous copies to improve scalability, performance and availability, this practice still lacks a firm semantic foundation. Applicati...
Hongfei Guo, Jonathan Goldstein, Per-Åke Lar...