Sciweavers

20745 search results - page 3712 / 4149
» Computer graphics for all
Sort
View
IMC
2009
ACM
16 years 12 hour ago
Live streaming performance of the Zattoo network
A number of commercial peer-to-peer systems for live streaming, such as PPLive, Joost, LiveStation, SOPCast, TVants, etc. have been introduced in recent years. The behavior of the...
Hyunseok Chang, Sugih Jamin, Wenjie Wang
SIGCOMM
2009
ACM
16 years 7 hour ago
Safe and effective fine-grained TCP retransmissions for datacenter communication
This paper presents a practical solution to a problem facing high-fan-in, high-bandwidth synchronized TCP workloads in datacenter Ethernets—the TCP incast problem. In these netw...
Vijay Vasudevan, Amar Phanishayee, Hiral Shah, Eli...
SIGECOM
2009
ACM
117views ECommerce» more  SIGECOM 2009»
16 years 7 hour ago
Sybilproof transitive trust protocols
We study protocols to enable one user (the principal) to make potentially profitable but risky interactions with another user (the agent), in the absence of direct trust between ...
Paul Resnick, Rahul Sami
SIGMETRICS
2009
ACM
134views Hardware» more  SIGMETRICS 2009»
16 years 6 hour ago
DRAM errors in the wild: a large-scale field study
Errors in dynamic random access memory (DRAM) are a common form of hardware failure in modern compute clusters. Failures are costly both in terms of hardware replacement costs and...
Bianca Schroeder, Eduardo Pinheiro, Wolf-Dietrich ...
SIGMETRICS
2009
ACM
122views Hardware» more  SIGMETRICS 2009»
16 years 6 hour ago
Botnet spam campaigns can be long lasting: evidence, implications, and analysis
Accurately identifying spam campaigns launched by a large number of bots in a botnet allows for accurate spam campaign signature generation and hence is critical to defeating spam...
Abhinav Pathak, Feng Qian, Y. Charlie Hu, Zhuoqing...
« Prev « First page 3712 / 4149 Last » Next »