Sciweavers

355 search results - page 59 / 71
» Overlapping Communication and Computation with High Level Co...
Sort
View
MOBIQUITOUS
2005
IEEE
15 years 5 months ago
Defend Against Cache Consistency Attacks in Wireless Ad Hoc Networks
Caching techniques can be used to reduce bandwidth consumption and data access delay in wireless ad hoc networks. When cache is used, cache consistency issues must be addressed. T...
Wensheng Zhang, Guohong Cao
ICCS
2005
Springer
15 years 5 months ago
Performance and Scalability Analysis of Cray X1 Vectorization and Multistreaming Optimization
Cray X1 Fortran and C/C++ compilers provide a number of loop transformations, notably vectorization and multistreaming, in order to exploit the multistreaming processor (MSP) hard...
Sadaf R. Alam, Jeffrey S. Vetter
SIGECOM
2004
ACM
120views ECommerce» more  SIGECOM 2004»
15 years 5 months ago
Robust incentive techniques for peer-to-peer networks
Lack of cooperation (free riding) is one of the key problems that confronts today’s P2P systems. What makes this problem particularly difficult is the unique set of challenges ...
Michal Feldman, Kevin Lai, Ion Stoica, John Chuang
IMC
2003
ACM
15 years 4 months ago
Simple network performance tomography
In network performance tomography, characteristics of the network interior are inferred by correlating end-to-end measurements. In much previous work, the presence of correlations...
Nick G. Duffield
91
Voted
IFIP
1989
Springer
15 years 3 months ago
Industrial Strength Software Development Environments
‘‘Industrial strength’’ software development environments (SDEs) must provide facilities to address three essential properties of multi-developer software systems: evoluti...
Dewayne E. Perry