Sciweavers

1162 search results - page 224 / 233
» Evaluation of network impact of content distribution mechani...
Sort
View
ICDCS
2009
IEEE
15 years 6 months ago
ISP Friend or Foe? Making P2P Live Streaming ISP-Aware
Abstract: Current peer-to-peer systems are network-agnostic, often generating large volumes of unnecessary inter-ISP traffic. Although recent work has shown the benefits of ISP-a...
Fabio Picconi, Laurent Massoulié
SRDS
1999
IEEE
15 years 1 months ago
An Adaptive Checkpointing Protocol to Bound Recovery Time with Message Logging
Numerous mathematical approaches have been proposed to determine the optimal checkpoint interval for minimizing total execution time of an application in the presence of failures....
Kuo-Feng Ssu, Bin Yao, W. Kent Fuchs
CSFW
2009
IEEE
15 years 1 months ago
Cryptographic Protocol Synthesis and Verification for Multiparty Sessions
We present the design and implementation of a compiler that, given high-level multiparty session descriptions, generates custom cryptographic protocols. Our sessions specify pre-a...
Karthikeyan Bhargavan, Ricardo Corin, Pierre-Malo ...
AICCSA
2008
IEEE
291views Hardware» more  AICCSA 2008»
14 years 11 months ago
A dynamic weighted data replication strategy in data grids
Data grids deal with a huge amount of data regularly. It is a fundamental challenge to ensure efficient accesses to such widely distributed data sets. Creating replicas to a suita...
Ruay-Shiung Chang, Hui-Ping Chang, Yun-Ting Wang
IJCAI
2007
14 years 11 months ago
Communicating Effectively in Resource-Constrained Multi-Agent Systems
Agents with partial observability need to share information to achieve decentralised coordination. However, in resource-constrained systems, indiscriminate communication can creat...
Partha Sarathi Dutta, Claudia V. Goldman, Nicholas...