Sciweavers

183 search results - page 25 / 37
» Stochastic Modelling of Communication Protocols from Source ...
Sort
View
81
Voted
CBSE
2009
Springer
15 years 2 months ago
Extracting Behavior Specification of Components in Legacy Applications
A challenge of componentizing legacy applications is to extract behavior specification of suggested components. It is desirable to preserve a relation between the original structur...
Tomás Poch, Frantisek Plasil
FGCS
2006
113views more  FGCS 2006»
14 years 9 months ago
Performance feature identification by comparative trace analysis
This work introduces a method for instrumenting applications, producing execution traces, and visualizing multiple trace instances to identify performance features. The approach p...
Daniel P. Spooner, Darren J. Kerbyson
IMC
2006
ACM
15 years 3 months ago
Rarest first and choke algorithms are enough
The performance of peer-to-peer file replication comes from its piece and peer selection strategies. Two such strategies have been introduced by the BitTorrent protocol: the rare...
Arnaud Legout, Guillaume Urvoy-Keller, Pietro Mich...
SIGMETRICS
2009
ACM
131views Hardware» more  SIGMETRICS 2009»
15 years 4 months ago
Modeling channel popularity dynamics in a large IPTV system
Understanding the channel popularity or content popularity is an important step in the workload characterization for modern information distribution systems (e.g., World Wide Web,...
Tongqing Qiu, Zihui Ge, Seungjoon Lee, Jia Wang, Q...
INFOCOM
2005
IEEE
15 years 3 months ago
Non-pipelined relay improves throughput performance of wireless ad-hoc networks
—The communication model typically assumed in wireless ad-hoc networks is based on a traditional “pipelined relay” (PR) strategy. In PR, an end-to-end flow has multiple outs...
Aravind Velayutham, Karthikeyan Sundaresan, Raghup...