Sciweavers

1937 search results - page 266 / 388
» Virtual networking
Sort
View
CCR
2006
92views more  CCR 2006»
15 years 4 months ago
Flow labelled IP over ATM: design and rationale
We describe a system in which layer 2 switching is placed directly under the control of layer 3 routing protocols on a hop-by-hop basis. Specifically, ATM switching is controlled ...
Greg Minshall, Robert M. Hinden, Eric Hoffman, Fon...
ICUMT
2009
15 years 2 months ago
Hierarchical p2p overlays for DVE: An Additively Weighted Voronoi based approach
This paper presents a support for the development of Distributed Virtual Environments (DVEs) on P2P architectures. A hierarchical overlay is defined by pairing each peer with a wei...
Michele Albano, Laura Ricci, Luca Genovali
WSDM
2009
ACM
187views Data Mining» more  WSDM 2009»
15 years 11 months ago
Speeding up algorithms on compressed web graphs
A variety of lossless compression schemes have been proposed to reduce the storage requirements of web graphs. One successful approach is virtual node compression [7], in which of...
Chinmay Karande, Kumar Chellapilla, Reid Andersen
AICCSA
2006
IEEE
134views Hardware» more  AICCSA 2006»
15 years 10 months ago
The vMatrix: Equi-Ping Game Server Placement For Pre-Arranged First-Person-Shooter Multiplayer Matches
Today most multiplayer game servers are pre-located statically, which makes it hard for gamers to find equi-ping hosts for their matches. This is especially important for first per...
Amr Awadallah, Mendel Rosenblum
ACSAC
2005
IEEE
15 years 10 months ago
Multi-Level Security Requirements for Hypervisors
Using hypervisors or virtual machine monitors for security has become very popular in recent years, and a number of proposals have been made for supporting multi-level security on...
Paul A. Karger