Filters








9,444 Hits in 8.6 sec

Towards Transparent Personal Content Storage in Multi-service Access Networks [chapter]

Koert Vlaeminck, Tim Wauters, Filip De Turck, Bart Dhoedt, Piet Demeester
2007 Lecture Notes in Computer Science  
In this respect, this paper considers the deployment of a personal content storage service in multi-service access networks.  ...  It is shown that the SSPA produces close to optimal results and is very efficient for optimizing server placement in personal content storage deployments.  ...  Acknowledgment This work is partially funded by the IBBT GBO project PeCMan.  ... 
doi:10.1007/978-3-540-77092-3_42 fatcat:s6nuugkywza77my4oqqth7oghu

On the network impact of dynamic server selection

Robert L. Carter, Mark E. Crovella
1999 Computer Networks  
Clients may be assigned to a replica in a static manner or they may choose among replicas based on client-initiated measurements.  ...  In the second part of this paper we use large-scale simulation to study the system-wide network impact of dynamic server selection.  ...  While we focus on the problem of dynamically selecting a server for replicated documents, most of our results should be applicable to replicated services in general.  ... 
doi:10.1016/s1389-1286(99)00119-x fatcat:4dlcy2qrinecpdoziche24xxi4

Improving cooling efficiency of servers by replacing smaller chassis enclosed fans with larger rack-mount fans

Bharath Nagendran, Shreyas Nagaraj, John Fernandes, Richard Eiland, Dereje Agonafer, Veerendra Mulay
2014 Fourteenth Intersociety Conference on Thermal and Thermomechanical Phenomena in Electronic Systems (ITherm)  
Dereje Agonafer for his continuous guidance and support over the last two years of my study and research at The University of Texas at Arlington.  ...  A porous obstruction is a simplified model of the actual system which replicates the flow in terms of the pressure drop across inlet and outlet, which is calculated based on the experimental results imparted  ...  For the server used in the base line study, the saved fan power is estimated based on the experimental results by controlling the fans internally.  ... 
doi:10.1109/itherm.2014.6892332 fatcat:odhjgiyk5je2perys63d7xavy4

The Trickle-Down Effect: Web Caching and Server Request Distribution

Ronald P Doyle, Jeffrey S Chase, Syam Gadde, Amin M Vahdat
2002 Computer Communications  
on the implications for request distribution strategies in server clusters.  ...  These caching agents are highly e ective for static content, which is an important component of all Web-based services.  ...  ACKNOWLEDGEMENTS We w ould like to thank Erich Nahum of IBM Research for providing us the 1998 IBM web server traces used in the LARD study.  ... 
doi:10.1016/s0140-3664(01)00406-6 fatcat:7bmvs5vxinfihpgo6uyzjflxwm

DeepFun: a deep learning sequence-based model to decipher non-coding variant effect in a tissue- and cell type-specific manner

Guangsheng Pei, Ruifeng Hu, Peilin Jia, Zhongming Zhao
2021 Nucleic Acids Research  
By using the datasets from various GWAS studies, we conducted independent validations and demonstrated the functions of the DeepFun web server in predicting the effect of a non-coding variant in a specific  ...  More than 90% of the genetic variants identified from genome-wide association studies (GWAS) are located in non-coding regions of the human genome.  ...  The funders had no role in the study design, data collection and analysis, decision to publish or preparation of the manuscript.  ... 
doi:10.1093/nar/gkab429 pmid:34048560 fatcat:hbavfmg5sjcxxkvpl3udpdwqwq

A game theoretical data replication technique for mobile ad hoc networks

Samee Ullah Khan, Anthony A. Maciejewski, Howard Jay Siegel, Ishfaq Ahmad
2008 Proceedings, International Parallel and Distributed Processing Symposium (IPDPS)  
The problem is further complicated by frequent partitions of the ad hoc network. In this paper, a mathematical model for data replication in ad hoc networks is formulated.  ...  Adaptive replication of data items on servers of a mobile ad hoc network can alleviate access delays.  ...  Acknowledgments: The authors would like to thank Luis Diego Briceño and Jay Smith for their valuable comments.  ... 
doi:10.1109/ipdps.2008.4536303 dblp:conf/ipps/KhanMSA08 fatcat:75guhe7nm5evncetvktxkktvzq

DrugComb: an integrative cancer drug combination data portal

2019 Nucleic Acids Research  
All the data and informatics tools are freely available in DrugComb to enable a more efficient utilization of data resources for future drug combination discovery.  ...  To initiate the data repository, we collected 437 932 drug combinations tested on a variety of cancer cell lines.  ...  ACKNOWLEDGEMENTS We thank the authors of the ALAMANC, ONEIL, FORCINA and CLOUD studies for making their drug combination data fully accessible.  ... 
doi:10.1093/nar/gkz337 pmid:31066443 pmcid:PMC6602441 fatcat:yj7tvmth25hcjktr3k3eozptje

A survey of schemes for Internet-based video delivery

Kevin J. Ma, Radim Bartoš, Swapnil Bhatia
2011 Journal of Network and Computer Applications  
We discuss how each of these paradigms is applied within the different segments of the end-to-end video delivery system: by the server, in the network, or at the client, with a focus on how the underlying  ...  Video quality is directly tied to the underlying networks' ability to deliver data in time for playout.  ...  Apostolopoulos et al. model an average packet loss of 5% based on studies performed in 1997 (Yajnik et al., 1999) .  ... 
doi:10.1016/j.jnca.2011.02.001 fatcat:acozf5a24vddvpx3hjc5ihuivm

Shedding Light on the Dark Corners of the Internet: A Survey of Tor Research [article]

Saad Saleh, Junaid Qadir, Muhammad U. Ilyas
2018 arXiv   pre-print
Quantitative analysis shows that the majority of research studies on Tor focus on 'deanonymization' the design of a breaching strategy.  ...  In this survey paper, we summarize, analyze, classify and quantify 26 years of research on the Tor network.  ...  In developing trust based model, authors take the relays uptime as the most trustworthy factor in determining the selection of the path.  ... 
arXiv:1803.02816v1 fatcat:kl5fkcq5tnbczblpgdesatocji

Cyber-T web server: differential analysis of high-throughput data

M. A. Kayala, P. Baldi
2012 Nucleic Acids Research  
Bioinformatics 2001: 17: 509-519) and implemented in the Cyber-T web server, is one of the most widely validated.  ...  The Bayesian regularization method for highthroughput differential analysis, described in Baldi and Long (A Bayesian framework for the analysis of microarray expression data: regularized t-test and statistical  ...  While existng tools for differential analysis of RNA-Seq data use a model based on the Negative-Binomial distribution [e.g. cuffdiff (9) , edgeR (10) or DESeq (11) ], all of these tools use count data  ... 
doi:10.1093/nar/gks420 pmid:22600740 pmcid:PMC3394347 fatcat:5w3z5j3qlzdfthrwht2kotoaie

Designing WebSphere Application Server for performance: An evolutionary approach

R. Willenborg, K. Brown, G. Cuomo
2004 IBM Systems Journal  
The ECperf** Expert Group, for example, publishes a number of results of measuring performance and scalability of J2EE servers. 8 The study of April, 22, 2002, shown in Figure 3 , reflects measurements  ...  on the server side in the same way that HTML page results are cached.  ...  Accepted for publication January 16, 2004 Cuomo has been a core member of the WebSphere development and architecture team since its inception in 1998.  ... 
doi:10.1147/sj.432.0327 fatcat:mv2gzoq3uvfmdcgnnkkgmfiyzm

A2M: Access-Assured Mobile Desktop Computing [chapter]

Angelos Stavrou, Ricardo A. Barrato, Angelos D. Keromytis, Jason Nieh
2009 Lecture Notes in Computer Science  
Our analysis and experimental results on PlanetLab demonstrate that A 2 M significantly increases the hosting infrastructure's attack resilience even for wireless scenarios.  ...  This packet replication through different paths, diversifies the client-server communication, boosting system resiliency and reducing end-toend latency.  ...  Figure 3 shows the results for video quality as measured at the client side.  ... 
doi:10.1007/978-3-642-04474-8_16 fatcat:zkewtxb4w5gshoqv3xbxcnvxty

Client-server computing in mobile environments

Jin Jing, Abdelsalam Sumi Helal, Ahmed Elmagarmid
1999 ACM Computing Surveys  
In this survey, we provide a concrete framework and categorization of the various ways of supporting mobile client-server computing for information access.  ...  We provide a comprehensive analysis of new paradigms and enabler concepts for mobile client-server computing, including mobile-aware adaptation, extended client-server model, and mobile data access.  ...  There are, applications are permitted to make trade-off of replicated data consistency & availability by using individually selectable session guarantees Model collaborative and flexible group-based client-server  ... 
doi:10.1145/319806.319814 fatcat:z2sqksxrrra4jivrtdpevobirm

Traffic modeling of player action categories in a MMORPG

Mirko Suznjevic, Ivana Stupar, Maja Matijasevic
2011 Proceedings of the 4th International ICST Conference on Simulation Tools and Techniques  
We have performed measurements for each of the previously defined action categories for MMORPGs (Trading, Questing, Dungeons, Raiding, and Player versus Player Combat) and formed models based on the obtained  ...  In this paper we present a user action specific modeling of network traffic in a Massively Multiplayer Online Role-Playing Game (MMORPG).  ...  Based on the measurements of player behavior in future work we aim to develop a model of player behavior based on action categories which combined with traffic models will allow us to simulate the overall  ... 
doi:10.4108/icst.simutools.2011.245546 dblp:conf/simutools/SuznjevicSM11 fatcat:dhmldp7dhvhqfb3cvcpie35bgm

Multi-tenant mobile offloading systems for real-time computer vision applications

Zhou Fang, Jeng-Hau Lin, Mani B. Srivastava, Rajesh K. Gupta
2019 Proceedings of the 20th International Conference on Distributed Computing and Networking - ICDCN '19  
On the server side, the master server manages data in a distributed in-memory key-value database.  ...  The agent selects actions based on a policy π(s, a) that gives the probability to perform a in state s.  ...  A microservice for this model can implement the following run method to process one of the three stages. Listing A.2.  ... 
doi:10.1145/3288599.3288634 dblp:conf/icdcn/FangLS019 fatcat:qpib2wkm7jdnfg7k64eh3hwje4
« Previous Showing results 1 — 15 out of 9,444 results