Sciweavers

486 search results - page 39 / 98
» policy 2005
Sort
View
65
Voted
SIGMETRICS
2005
ACM
113views Hardware» more  SIGMETRICS 2005»
15 years 3 months ago
Some observations on bitTorrent performance
In this paper, we present a simulation-based study of BitTorrent. Our results confirm that BitTorrent performs nearoptimally in terms of uplink bandwidth utilization and download...
Ashwin R. Bharambe, Cormac Herley, Venkata N. Padm...
95
Voted
CCS
2005
ACM
15 years 3 months ago
A framework for concrete reputation-systems with applications to history-based access control
In a reputation-based trust-management system, agents maintain information about the past behaviour of other agents. This information is used to guide future trust-based decisions...
Karl Krukow, Mogens Nielsen, Vladimiro Sassone
VLDB
2005
ACM
90views Database» more  VLDB 2005»
15 years 3 months ago
Getting Priorities Straight: Improving Linux Support for Database I/O
The Linux 2.6 kernel supports asynchronous I/O as a result of propositions from the database industry. This is a positive evolution but is it a panacea? In the context of the Badg...
Christoffer Hall, Philippe Bonnet
ICMCS
2005
IEEE
80views Multimedia» more  ICMCS 2005»
15 years 3 months ago
Maximizing the profit for cache replacement in a transcoding proxy
Recent technology advances in multimedia communication have ushered in a new era of personal communication. Users can ubiquitously access the Internet via various mobile devices. ...
Hao-Ping Hung, Ming-Syan Chen
83
Voted
DATE
2005
IEEE
134views Hardware» more  DATE 2005»
15 years 3 months ago
Assertion-Based Design Exploration of DVS in Network Processor Architectures
With the scaling of technology and higher requirements on performance and functionality, power dissipation is becoming one of the major design considerations in the development of...
Jia Yu, Wei Wu, Xi Chen, Harry Hsieh, Jun Yang 000...