Sciweavers

854 search results - page 50 / 171
» Using Simulation to Investigate Requirements Prioritization ...
Sort
View
114
Voted
TKDE
1998
163views more  TKDE 1998»
14 years 10 months ago
A Highly Effective Partition Selection Policy for Object Database Garbage Collection
—We investigate methods to improve the performance of algorithms for automatic storage reclamation of object databases. These algorithms are based on a technique called partition...
Jonathan E. Cook, Alexander L. Wolf, Benjamin G. Z...
104
Voted
NCA
2009
IEEE
15 years 5 months ago
Simulating Fixed Virtual Nodes for Adapting Wireline Protocols to MANET
Abstract— The Virtual Node Layer (VNLayer) is a programtraction for Mobile Ad Hoc Networks (MANETs). It defines simple virtual servers at fixed locations in a network, addressi...
Jiang Wu, Nancy D. Griffeth, Nancy A. Lynch, Calvi...
89
Voted
CCR
1998
90views more  CCR 1998»
14 years 10 months ago
On the generation and use of TCP acknowledgments
This paper presents a simulation study of various TCP acknowledgment generation and utilization techniques. We investigate the standard version of TCP and the two standard acknowl...
Mark Allman
107
Voted
IEEEPACT
2002
IEEE
15 years 3 months ago
Transparent Threads: Resource Sharing in SMT Processors for High Single-Thread Performance
Simultaneous Multithreading (SMT) processors achieve high processor throughput at the expense of single-thread performance. This paper investigates resource allocation policies fo...
Gautham K. Dorai, Donald Yeung
CCS
2007
ACM
15 years 2 months ago
Improving multi-tier security using redundant authentication
Multi-tier web server systems are used in many important contexts and their security is a major cause of concern. Such systems can exploit strategies like least privilege to make ...
Jodie P. Boyer, Ragib Hasan, Lars E. Olson, Nikita...