Sciweavers

2390 search results - page 444 / 478
» Architectural Views and Alternatives
Sort
View
ICC
2007
IEEE
150views Communications» more  ICC 2007»
15 years 5 months ago
Improving the Download Time of BitTorrent-Like Systems
The content distribution techniques have recently started embracing peer-to-peer system as an alternative to the client-server architecture, such as BitTorrent system. BitTorrent ...
Chi-Jen Wu, Cheng-Ying Li, Jan-Ming Ho
ISCA
2007
IEEE
146views Hardware» more  ISCA 2007»
15 years 5 months ago
Virtual hierarchies to support server consolidation
Server consolidation is becoming an increasingly popular technique to manage and utilize systems. This paper develops CMP memory systems for server consolidation where most sharin...
Michael R. Marty, Mark D. Hill
VLDB
2007
ACM
295views Database» more  VLDB 2007»
15 years 5 months ago
From Data Privacy to Location Privacy: Models and Algorithms
This tutorial presents the definition, the models and the techniques of location privacy from the data privacy perspective. By reviewing and revising the state of art research in ...
Ling Liu
ACSAC
2006
IEEE
15 years 5 months ago
A Module System for Isolating Untrusted Software Extensions
With the recent advent of dynamically extensible software systems, in which software extensions may be dynamically loaded into the address space of a core application to augment i...
Philip W. L. Fong, Simon A. Orr
ISPASS
2006
IEEE
15 years 5 months ago
Modeling TCAM power for next generation network devices
Applications in Computer Networks often require high throughput access to large data structures for lookup and classification. Many advanced algorithms exist to speed these searc...
Banit Agrawal, Timothy Sherwood