Sciweavers

193 search results - page 30 / 39
» Internet service performance failure detection
Sort
View
AP2PS
2009
IEEE
15 years 6 months ago
Detection of Encrypted Traffic in eDonkey Network through Application Signatures
—Peer-to-peer file sharing applications became very popular, being responsible for a large percentage of the network traffic. However, peer-to-peer traffic may compromise the per...
Mário M. Freire, David A. Carvalho, Manuela...
PERCOM
2003
ACM
15 years 11 months ago
Self-Adaptive Leasing for Jini
Distributed systems require strategies to detect and recover from failures. Many protocols for distributed systems employ a strategy based on leases, which grant a leaseholder acc...
Kevin Bowers, Kevin Mills, Scott Rose
WWW
2011
ACM
14 years 6 months ago
Predicting popular messages in Twitter
Social network services have become a viable source of information for users. In Twitter, information deemed important by the community propagates through retweets. Studying the c...
Liangjie Hong, Ovidiu Dan, Brian D. Davison
71
Voted
WWIC
2009
Springer
157views Communications» more  WWIC 2009»
15 years 6 months ago
An Adaptive Optimized RTO Algorithm for Multi-homed Wireless Environments
As a transport layer protocol SCTP uses end to end metrics, such as Retransmission Time Out (RTO), to manage mobility handover. Our investigation illustrates that Wireless LAN (WLA...
Sheila Fallon, Paul Jacob, Yuansong Qiao, Liam Mur...
88
Voted
COMAD
2009
15 years 25 days ago
Consistency of Databases on Commodity Disk Drives
Most database systems use ARIES-like logging and recovery scheme to recover from failures and guarantee transactional consistency. ARIES relies on the Write-Ahead Logging (WAL) pr...
Robin Dhamankar, Hanuma Kodavalla, Vishal Kathuria