Sciweavers

20017 search results - page 3792 / 4004
» Using personas effectively
Sort
View
135
Voted
WWW
2003
ACM
16 years 4 months ago
The Eigentrust algorithm for reputation management in P2P networks
Peer-to-peer file-sharing networks are currently receiving much attention as a means of sharing and distributing information. However, as recent experience shows, the anonymous, o...
Sepandar D. Kamvar, Mario T. Schlosser, Hector Gar...
128
Voted
WWW
2003
ACM
16 years 4 months ago
Buffer Sharing for Proxy Caching of Streaming Sessions
With the falling price of the memory, an increasing number of multimedia servers and proxies are now equipped with a large memory space. Caching media objects in the memory of a p...
Songqing Chen, Bo Shen, Yong Yan, Xiaodong Zhang
227
Voted
ICFP
2009
ACM
16 years 4 months ago
Partial memoization of concurrency and communication
Memoization is a well-known optimization technique used to eliminate redundant calls for pure functions. If a call to a function f with argument v yields result r, a subsequent ca...
Lukasz Ziarek, K. C. Sivaramakrishnan, Suresh Jaga...
263
Voted
POPL
2009
ACM
16 years 4 months ago
Feedback-directed barrier optimization in a strongly isolated STM
Speed improvements in today's processors have largely been delivered in the form of multiple cores, increasing the importance of ions that ease parallel programming. Software...
Nathan Grasso Bronson, Christos Kozyrakis, Kunle O...
228
Voted
ASPLOS
2009
ACM
16 years 4 months ago
Producing wrong data without doing anything obviously wrong!
This paper presents a surprising result: changing a seemingly innocuous aspect of an experimental setup can cause a systems researcher to draw wrong conclusions from an experiment...
Todd Mytkowicz, Amer Diwan, Matthias Hauswirth, Pe...
« Prev « First page 3792 / 4004 Last » Next »