Sciweavers

1498 search results - page 211 / 300
» Network control as a distributed object application
Sort
View
IC3
2009
14 years 7 months ago
IDChase: Mitigating Identifier Migration Trap in Biological Databases
A convenient mechanism to refer to large biological objects such as sequences, structures and networks is the use of identifiers or handles, commonly called IDs. IDs function as a ...
Anupam Bhattacharjee, Aminul Islam, Hasan M. Jamil...
CLUSTER
2001
IEEE
15 years 1 months ago
SOVIA: A User-level Sockets Layer Over Virtual Interface Architecture
The Virtual Interface Architecture (VIA) is an industry standard user-level communication architecture for system area networks. The VIA provides a protected, directlyaccessible i...
Jin-Soo Kim, Kangho Kim, Sung-In Jung
SENSYS
2004
ACM
15 years 3 months ago
The dynamic behavior of a data dissemination protocol for network programming at scale
To support network programming, we present Deluge, a reliable data dissemination protocol for propagating large data objects from one or more source nodes to many other nodes over...
Jonathan W. Hui, David E. Culler
KIVS
2001
Springer
15 years 2 months ago
Improving the Performance of TCP on Guaranteed Bandwidth Connections
This paper discusses the performance of the Transmission Control Protocol under two aspects: First, the future Internet will provide some kind of service differentiation and bandw...
Hartmut Ritter, Klaus Wehrle, Lars C. Wolf
MOBICOM
2004
ACM
15 years 3 months ago
End-to-end performance and fairness in multihop wireless backhaul networks
Wireless IEEE 802.11 networks in residences, small businesses, and public “hot spots” typically encounter the wireline access link (DSL, cable modem, T1, etc.) as the slowest ...
Violeta Gambiroza, Bahareh Sadeghi, Edward W. Knig...