Sciweavers

2027 search results - page 355 / 406
» When is it best to best-respond
Sort
View
115
Voted
HICSS
2003
IEEE
151views Biometrics» more  HICSS 2003»
15 years 6 months ago
An Evaluation of Applying Use Cases to Construct Design versus Validate Design
Use case models capture and describe the functional requirements of a software system. A use case driven development process, where a use case model is the principal basis for con...
Erik Syversen, Bente Anda, Dag I. K. Sjøber...
90
Voted
INFOCOM
2003
IEEE
15 years 6 months ago
TCP-LP: A Distributed Algorithm for Low Priority Data Transfer
— Service prioritization among different traffic classes is an important goal for the future Internet. Conventional approaches to solving this problem consider the existing best...
Aleksandar Kuzmanovic, Edward W. Knightly
94
Voted
IPPS
2003
IEEE
15 years 6 months ago
Cost/Performance Tradeoffs in Network Interconnects for Clusters of Commodity PCs
The definition of a commodity component is quite obvious when it comes to the PC as a basic compute engine and building block for clusters of PCs. Looking at the options for a mo...
Christian Kurmann, Felix Rauch, Thomas Stricker
MICRO
2003
IEEE
128views Hardware» more  MICRO 2003»
15 years 6 months ago
IPStash: a Power-Efficient Memory Architecture for IP-lookup
Abstract—High-speed routers often use commodity, fully-associative, TCAMs (Ternary Content Addressable Memories) to perform packet classification and routing (IP lookup). We prop...
Stefanos Kaxiras, Georgios Keramidas
126
Voted
NCA
2003
IEEE
15 years 6 months ago
Web Proxy Cache Replacement: Do's, Don'ts, and Expectations
Numerous research efforts have produced a large number of algorithms and mechanisms for web proxy caches. In order to build powerful web proxies and understand their performance, ...
Peter Triantafillou, Ioannis Aekaterinidis