Computing Reviews
Today's Issue Hot Topics Search Browse Recommended My Account Log In
Browse by topic Browse by titles Authors Reviewers Browse by issue Browse Help
Search
  Browse All Reviews > Software (D) > Operating Systems (D.4) > Communications Management (D.4.4) > Network Communication (D.4.4...)  
 
Options:
 
  1-10 of 76 Reviews about "Network Communication (D.4.4...)": Date Reviewed
  Shielding applications from an untrusted cloud with Haven
Baumann A., Peinado M., Hunt G.  OSDI 2014 (Proceedings of the 11th USENIX Conference on Operating Systems Design and Implementation, Broomfield, CO,  Oct 6-8, 2014) 267-283, 2014. Type: Proceedings

Cloud computing is a recent model for provisioning commodity hardware with a preinstalled software environment to run a custom software executable, where the provider of the commodity environment has enormous latitude for its provisioning. The ter...

Feb 23 2015
  A survey of context data distribution for mobile ubiquitous systems
Bellavista P., Corradi A., Fanelli M., Foschini L.  ACM Computing Surveys 44(4): 1-45, 2012. Type: Article

Effective context awareness is pertinent across networks today. The fact that a standardized solution has not yet been established is testament to the ongoing evolution and volatility of networks and the technologies involved....

Apr 5 2013
  Practical and low-overhead masking of failures of TCP-based servers
Zagorodnov D., Marzullo K., Alvisi L., Bressoud T.  ACM Transactions on Computer Systems 27(2): 1-39, 2009. Type: Article

An interesting approach to maintaining transmission control protocol (TCP) connections when a server crashes is described in this paper. TCP is usually implemented in the operating system, and the protocol provides reliable communications between ...

Apr 15 2010
  Rethinking FTP: aggressive block reordering for large file transfers
Anastasiadis S., Wickremesinghe R., Chase J.  ACM Transactions on Storage 4(4): 1-27, 2009. Type: Article

In the context of whole-file transfers, Anastasiadis et al. propose block reordering heuristics to maximize throughput by reducing disk traffic. First, already-cached blocks are transferred to all clients concurrently requesting th...

May 11 2009
  A channel-based fair scheduling scheme for downlink data transmission in TD-CDMA networks
Zhao Y., Anpalagan A.  Wireless Personal Communications: An International Journal 46(4): 469-491, 2008. Type: Article

The paper is a study of scheduling schemes for providing high-speed data services in time division-code division multiple access (TD-CDMA) systems, especially mobile wireless networks. In particular, channel-based only (CBO), random scheduling (RS...

Jan 21 2009
  Twelve steps to recovery: my co-dependent relationship with Tivoli
Griffiths K., Kramolis T.  User services (Proceedings of the 35th Annual ACM SIGUCCS Conference on User Services, Orlando, Florida,  Oct 7-10, 2007) 135-138, 2007. Type: Proceedings

Over the past decade, the pervasiveness of the Internet has resulted in an astounding growth of digital content. This growth is not about to slow down anytime soon. Thus, back-up and recovery of this digital content is becoming increasingly import...

Jan 11 2008
  Understanding Linux network internals
Benvenuti C.,  O’Reilly Media, Inc., Sebastopol, CA, 2005. 1062 pp. Type: Book (9780596002558)

With network connectivity becoming almost ubiquitous, we take it for granted that a device can be plugged into a network and work seamlessly. Behind the scenes, however, the networking stack of the device is doing a hard and tedious job: configu...

Mar 20 2007
  A classical introduction to cryptography: applications for communications security
Vaudenay S.,  Springer-Verlag New York, Inc., Secaucus, NJ, 2005. 335 pp. Type: Book (9780387254647)

This book introduces the basic concepts of information and communication security by providing the appropriate mathematical elements to prove or break the security of cryptographic schemes. It is the transcript of a course held by the author at th...

May 10 2006
  Linux quick fix notebook (Bruce Perens’s Open Source)
Harrison P.,  Prentice Hall PTR, Upper Saddle River, NJ, 2005. 696 pp. Type: Book (9780131861503)

During the past decade, Linux has become a widely used platform, being installed on a wide range of devices, from smartphones to corporate servers. The complexity of Linux distributions and the number of distributions have increased along with the...

Apr 13 2006
  Virtual square (V2) in computer science education
Davoli R., Goldweber M.  Innovation and technology in computer science education (Proceedings of the 10th Annual SIGCSE Conference on Innovation and Technology in Computer Science Education, Capacrica, Portugal,  Jun 27-29, 2005) 301-305, 2005. Type: Proceedings

The space formed by networked computers is often referred to as being virtual. Students of computer science need to learn about computers and networks in a hands-on way; when teaching computer security in particular, a sandbox of networked systems...

Aug 4 2005
 
 
 
Display per page
Send Your Comments
Contact Us
Reproduction in whole or in part without permission is prohibited.   Copyright © 2000-2017 ThinkLoud, Inc.
Terms of Use
| Privacy Policy