Sciweavers

3639 search results - page 567 / 728
» Provenance as Dependency Analysis
Sort
View
ANCS
2005
ACM
15 years 6 months ago
Architectural impact of stateful networking applications
The explosive and robust growth of the Internet owes a lot to the ”end-to-end principle”, which pushes stateful operations to the end-points. The Internet grew both in traffic...
Javier Verdú, Jorge García-Vidal, Ma...
94
Voted
IMC
2005
ACM
15 years 6 months ago
Predicting Short-Transfer Latency from TCP Arcana: A Trace-based Validation
In some contexts it may be useful to predict the latency for short TCP transfers. For example, a Web server could automatically tailor its content depending on the network path to...
Martin F. Arlitt, Balachander Krishnamurthy, Jeffr...
89
Voted
ISLPED
2005
ACM
101views Hardware» more  ISLPED 2005»
15 years 6 months ago
Defocus-aware leakage estimation and control
Leakage power is one of the most critical issues for ultra-deep submicron technology. Subthreshold leakage depends exponentially on linewidth, and consequently variation in linewi...
Andrew B. Kahng, Swamy Muddu, Puneet Sharma
MINENET
2005
ACM
15 years 6 months ago
Shrink: a tool for failure diagnosis in IP networks
Faults in an IP network have various causes such as the failure of one or more routers at the IP layer, fiber-cuts, failure of physical elements at the optical layer, or extraneo...
Srikanth Kandula, Dina Katabi, Jean-Philippe Vasse...
PODC
2005
ACM
15 years 6 months ago
Facility location: distributed approximation
In this paper, we initiate the study of the approximability of the facility location problem in a distributed setting. In particular, we explore a trade-off between the amount of...
Thomas Moscibroda, Roger Wattenhofer