Sciweavers

1111 search results - page 202 / 223
» Network coding for large scale content distribution
Sort
View
CCS
2009
ACM
15 years 4 months ago
Ripley: automatically securing web 2.0 applications through replicated execution
Rich Internet applications are becoming increasingly distributed, as demonstrated by the popularity of AJAX or Web 2.0 applications such as Facebook, Google Maps, Hotmail and many...
K. Vikram, Abhishek Prateek, V. Benjamin Livshits
82
Voted
SIGCOMM
2004
ACM
15 years 2 months ago
A comparison of overlay routing and multihoming route control
The limitations of BGP routing in the Internet are often blamed for poor end-to-end performance and prolonged connectivity interruptions. Recent work advocates using overlays to e...
Aditya Akella, Jeffrey Pang, Bruce M. Maggs, Srini...
63
Voted
ICCD
2002
IEEE
164views Hardware» more  ICCD 2002»
15 years 6 months ago
Locating Tiny Sensors in Time and Space: A Case Study
— As the cost of embedded sensors and actuators drops, new applications will arise that exploit high density networks of small devices capable of a variety of sensing tasks. Alth...
Lewis Girod, Vladimir Bychkovskiy, Jeremy Elson, D...
ICDCSW
2007
IEEE
15 years 3 months ago
Towards Fair Event Dissemination
Event dissemination in large scale dynamic systems is typically claimed to be best achieved using decentralized peer-to-peer architectures. The rationale is to have every particip...
Sébastien Baehni, Rachid Guerraoui, Boris K...
SIGCOMM
1994
ACM
15 years 1 months ago
Wide-Area Traffic: The Failure of Poisson Modeling
Network arrivals are often modeled as Poisson processes for analytic simplicity, even though a number of traffic studies have shown that packet interarrivals are not exponentially...
Vern Paxson, Sally Floyd