Sciweavers

8770 search results - page 1460 / 1754
» Named Service Networking
Sort
View
SIGMETRICS
2003
ACM
150views Hardware» more  SIGMETRICS 2003»
15 years 5 months ago
Conductance and congestion in power law graphs
It has been observed that the degrees of the topologies of several communication networks follow heavy tailed statistics. What is the impact of such heavy tailed statistics on the...
Christos Gkantsidis, Milena Mihail, Amin Saberi
EUROPAR
2009
Springer
15 years 4 months ago
MyriXen: Message Passing in Xen Virtual Machines over Myrinet and Ethernet
Data access in HPC infrastructures is realized via user-level networking and OS-bypass techniques through which nodes can communicate with high bandwidth and low-latency. Virtualiz...
Anastassios Nanos, Nectarios Koziris
ICDCS
2010
IEEE
15 years 3 months ago
Guaranteeing BGP Stability with a Few Extra Paths
Abstract—Policy autonomy exercised by Autonomous Systems (ASes) on the Internet can result in persistent oscillations in Border Gateway Protocol, the Internet’s inter-domain ro...
Rachit Agarwal, Virajith Jalaparti, Matthew Caesar...
KDD
2010
ACM
293views Data Mining» more  KDD 2010»
15 years 3 months ago
BioSnowball: automated population of Wikis
Internet users regularly have the need to find biographies and facts of people of interest. Wikipedia has become the first stop for celebrity biographies and facts. However, Wik...
Xiaojiang Liu, Zaiqing Nie, Nenghai Yu, Ji-Rong We...
CCS
2006
ACM
15 years 3 months ago
An effective defense against email spam laundering
Laundering email spam through open-proxies or compromised PCs is a widely-used trick to conceal real spam sources and reduce spamming cost in underground email spam industry. Spam...
Mengjun Xie, Heng Yin, Haining Wang
« Prev « First page 1460 / 1754 Last » Next »