Sciweavers

12897 search results - page 2392 / 2580
» Multi-Torrent: A Performance Study
Sort
View
CN
2007
108views more  CN 2007»
15 years 1 months ago
On the peninsula phenomenon in web graph and its implications on web search
Web masters usually place certain web pages such as home pages and index pages in front of others. Under such a design, it is necessary to go through some pages to reach the desti...
Tao Meng, Hong-Fei Yan
92
Voted
CN
2007
80views more  CN 2007»
15 years 1 months ago
Receiver-centric congestion control with a misbehaving receiver: Vulnerabilities and end-point solutions
Receiver-driven TCP protocols delegate key congestion control functions to receivers. Their goal is to exploit information available only at receivers in order to improve latency ...
Aleksandar Kuzmanovic, Edward W. Knightly
CN
2007
88views more  CN 2007»
15 years 1 months ago
DMTP: Controlling spam through message delivery differentiation
Unsolicited commercial email, commonly known as spam, has become a pressing problem in today’s Internet. In this paper we re-examine the architectural foundations of the current...
Zhenhai Duan, Yingfei Dong, Kartik Gopalan
101
Voted
CN
2007
95views more  CN 2007»
15 years 1 months ago
Sampling large Internet topologies for simulation purposes
In this paper, we develop methods to ‘‘sample’’ a small realistic graph from a large Internet topology. Despite recent activity, modeling and generation of realistic graph...
Vaishnavi Krishnamurthy, Michalis Faloutsos, Marek...
CN
2007
120views more  CN 2007»
15 years 1 months ago
A case for Passive Application Layer Multicast
Over the last few years, application-layer multicast (ALM) has emerged as a plausible solution for supporting group-oriented applications. However, ALM suffers from inefficiency ...
Xiaolong Li, Aaron Striegel
« Prev « First page 2392 / 2580 Last » Next »