Sciweavers

171 search results - page 14 / 35
» Evaluating the limitations of and alternatives in beaconing
Sort
View
CCR
1998
90views more  CCR 1998»
14 years 11 months ago
On the generation and use of TCP acknowledgments
This paper presents a simulation study of various TCP acknowledgment generation and utilization techniques. We investigate the standard version of TCP and the two standard acknowl...
Mark Allman
AUSAI
2009
Springer
15 years 3 months ago
Classification-Assisted Memetic Algorithms for Equality-Constrained Optimization Problems
Regressions has successfully been incorporated into memetic algorithm (MA) to build surrogate models for the objective or constraint landscape of optimization problems. This helps ...
Stephanus Daniel Handoko, Chee Keong Kwoh, Yew-Soo...
MICRO
1998
IEEE
79views Hardware» more  MICRO 1998»
15 years 4 months ago
Widening Resources: A Cost-effective Technique for Aggressive ILP Architectures
The inherent instruction-level parallelism (ILP) of current applications (specially those based on floating point computations) has driven hardware designers and compilers writers...
David López, Josep Llosa, Mateo Valero, Edu...
ICSE
2004
IEEE-ACM
15 years 12 months ago
Extending the Representational State Transfer (REST) Architectural Style for Decentralized Systems
Because it takes time and trust to establish agreement, traditional consensus-based architectural styles cannot safely accommodate resources that change faster than it takes to tr...
Rohit Khare, Richard N. Taylor
ICCS
2009
Springer
15 years 6 months ago
Improving the Scalability of SimGrid Using Dynamic Routing
Research into large-scale distributed systems often relies on the use of simulation frameworks in order to bypass the disadvantages of performing experiments on real testbeds. SimG...
Silas De Munck, Kurt Vanmechelen, Jan Broeckhove