Sciweavers

5234 search results - page 825 / 1047
» Simulation of Computer Network Attacks
Sort
View
INFOCOM
2010
IEEE
15 years 2 months ago
P2P Trading in Social Networks: The Value of Staying Connected
—The success of future P2P applications ultimately depends on whether users will contribute their bandwidth, CPU and storage resources to a larger community. In this paper, we pr...
Zhengye Liu, Hao Hu, Yong Liu, Keith W. Ross, Yao ...
HPDC
2008
IEEE
15 years 11 months ago
Improving peer connectivity in wide-area overlays of virtual workstations
Self-configuring virtual networks rely on structured P2P routing to provide seamless connectivity among nodes through overlay routing of virtual IP packets, support decentralized...
Arijit Ganguly, P. Oscar Boykin, David Wolinsky, R...
NSDI
2008
15 years 6 months ago
DieCast: Testing Distributed Systems with an Accurate Scale Model
Large-scale network services can consist of tens of thousands of machines running thousands of unique software configurations spread across hundreds of physical networks. Testing ...
Diwaker Gupta, Kashi Venkatesh Vishwanath, Amin Va...
CCR
2004
86views more  CCR 2004»
15 years 4 months ago
On the scaling of congestion in the internet graph
As the Internet grows in size, it becomes crucial to understand how the speeds of links in the network must improve in order to sustain the pressure of new end-nodes being added e...
Aditya Akella, Shuchi Chawla, Arvind Kannan, Srini...
SIGMETRICS
2011
ACM
237views Hardware» more  SIGMETRICS 2011»
14 years 7 months ago
Analysis of DCTCP: stability, convergence, and fairness
Cloud computing, social networking and information networks (for search, news feeds, etc) are driving interest in the deployment of large data centers. TCP is the dominant Layer 3...
Mohammad Alizadeh, Adel Javanmard, Balaji Prabhaka...