Sciweavers

2904 search results - page 534 / 581
» Internet Infrastructure Security
Sort
View
150
Voted
CORR
2002
Springer
156views Education» more  CORR 2002»
15 years 3 months ago
Mapping the Gnutella Network: Properties of Large-Scale Peer-to-Peer Systems and Implications for System Design
Despite recent excitement generated by the peer-to-peer (P2P) paradigm and the surprisingly rapid deployment of some P2P applications, there are few quantitative evaluations of P2...
Matei Ripeanu, Ian T. Foster, Adriana Iamnitchi
157
Voted
SIGMETRICS
2000
ACM
144views Hardware» more  SIGMETRICS 2000»
15 years 3 months ago
Bistro: a framework for building scalable wide-area Upload applications
Hot spots are a major obstacle to achieving scalability in the Internet. At the application layer, hot spots are usually caused by either (a) high demand for some data or (b) high...
Samrat Bhattacharjee, William C. Cheng, Cheng-Fu C...
153
Voted
TON
2002
116views more  TON 2002»
15 years 3 months ago
Managing capacity for telecommunications networks under uncertainty
The existing telecommunications infrastructure in most of the world is adequate to deliver voice and text applications, but demand for broadband services such as streaming video an...
Yann d'Halluin, Peter A. Forsyth, Kenneth R. Vetza...
141
Voted
IJESMA
2010
136views more  IJESMA 2010»
15 years 26 days ago
Understanding Shared Services: An Exploration of the IS Literature
In a competitive environment, companies continuously innovate to offer superior services at lower costs. `Shared services' have been extensively adopted in practice as one me...
Suraya Miskon, Wasana Bandara, Erwin Fielt, Guy G....
127
Voted
CORR
2010
Springer
151views Education» more  CORR 2010»
15 years 10 days ago
Selective Call Out and Real Time Bidding
Display ads on the Internet are increasingly sold via ad exchanges such as RightMedia, AdECN and Doubleclick Ad Exchange. These exchanges allow real-time bidding, that is, each ti...
Tanmoy Chakraborty, Eyal Even-Dar, Sudipto Guha, Y...