Sciweavers

123 search results - page 6 / 25
» Performance Evaluation of Consistent Recovery Protocols Usin...
Sort
View
ADHOC
2008
132views more  ADHOC 2008»
14 years 9 months ago
Defending against cache consistency attacks in wireless ad hoc networks
Caching techniques can be used to reduce bandwidth consumption and data access delay in wireless ad hoc networks. When cache is used, the issue of cache consistency must be addres...
Wensheng Zhang, Guohong Cao
MOBICOM
1999
ACM
15 years 1 months ago
Optimizing the End-to-End Performance of Reliable Flows Over Wireless Links
We present the results of a performance evaluation of link layer error recovery over wireless links. Our analysis is based upon a case study of the circuit-switched data service i...
Reiner Ludwig, Almudena Konrad, Anthony D. Joseph
SBACPAD
2004
IEEE
111views Hardware» more  SBACPAD 2004»
14 years 11 months ago
Performance Evaluation of a Prototype Distributed NFS Server
A high-performance file system is normally a key point for large cluster installations, where hundreds or even thousands of nodes frequently need to manage large volumes of data. ...
Rafael Bohrer Ávila, Philippe Olivier Alexa...
DAIS
2006
14 years 11 months ago
Using Speculative Push for Unnecessary Checkpoint Creation Avoidance
Abstract. This paper discusses a way of incorporating speculation techniques into Distributed Shared Memory (DSM) systems with checkpointing mechanism without creating unnecessary ...
Arkadiusz Danilecki, Michal Szychowiak
TSE
1998
112views more  TSE 1998»
14 years 9 months ago
Message Logging: Pessimistic, Optimistic, Causal, and Optimal
Message-logging protocols are an integral part of a popular technique for implementing processes that can recover from crash failures. All message-logging protocols require that, ...
Lorenzo Alvisi, Keith Marzullo