• Documents
  • Authors
  • Tables
  • Log in
  • Sign up
  • MetaCart
  • DMCA
  • Donate

CiteSeerX logo

Advanced Search Include Citations

Tools

Sorted by:
Try your query at:
Semantic Scholar Scholar Academic
Google Bing DBLP
Results 1 - 10 of 4,133
Next 10 →

Effect of Large Buffers on TCP Queueing Behavior

by Jinsheng Sun, Moshe Zukerman, King-tim Ko, Guanrong Chen, Sammy Chan - in Proceedings of INFOCOM , 2004
"... Using a simple model of saturated, synchronized and homogeneous sources of TCP Reno with drop-tail queue management and a discrete-time framework, we derive formulae for stationary as well as transient queueing behavior that shed light on the relationship between large buffers and work conservation ..."
Abstract - Cited by 5 (1 self) - Add to MetaCart
Using a simple model of saturated, synchronized and homogeneous sources of TCP Reno with drop-tail queue management and a discrete-time framework, we derive formulae for stationary as well as transient queueing behavior that shed light on the relationship between large buffers and work conservation

Mining Association Rules between Sets of Items in Large Databases

by Rakesh Agrawal, Tomasz Imielinski, Arun Swami - IN: PROCEEDINGS OF THE 1993 ACM SIGMOD INTERNATIONAL CONFERENCE ON MANAGEMENT OF DATA, WASHINGTON DC (USA , 1993
"... We are given a large database of customer transactions. Each transaction consists of items purchased by a customer in a visit. We present an efficient algorithm that generates all significant association rules between items in the database. The algorithm incorporates buffer management and novel esti ..."
Abstract - Cited by 3331 (16 self) - Add to MetaCart
We are given a large database of customer transactions. Each transaction consists of items purchased by a customer in a visit. We present an efficient algorithm that generates all significant association rules between items in the database. The algorithm incorporates buffer management and novel

Large Buffer Asymptotics For The Queue With FBM Input

by Laurent Massoulié, Alain Simonian - Journal of Applied Probability
"... In this paper, a strong asymptotic estimate for the queue content distribution of a fluid queue fed by a Fractional Brownian input with Hurst parameter H 2 [1=2; 1[ is studied. By applying general results on suprema of centered Gaussian processes, in particular, we show that P(V 0 ? x) L x fl \D ..."
Abstract - Cited by 17 (0 self) - Add to MetaCart
\Delta e \Gamma 2 x 2(1\GammaH) =2 for large x. Explicit formulae for constants , fl and L are given in terms of H and system parameters. 1 Introduction Let the fractional Brownian input process fW t g be defined by W t = mt + oeZ t ; t 0; (1.1) where m, oe are positive constants and fZ t g is a

Sizing Router Buffers

by Guido Appenzeller, Isaac Keslassy, Nick McKeown , 2004
"... All Internet routers contain buffers to hold packets during times of congestion. Today, the size of the buffers is determined by the dynamics of TCP’s congestion control algorithm. In particular, the goal is to make sure that when a link is congested, it is busy 100 % of the time; which is equivalen ..."
Abstract - Cited by 352 (17 self) - Add to MetaCart
approximately 250ms × 10Gb/s = 2.5Gbits of buffers; and the amount of buffering grows linearly with the line-rate. Such large buffers are challenging for router manufacturers, who must use large, slow, off-chip DRAMs. And queueing delays can be long, have high variance, and may destabilize the congestion

Optimal Aggregation Algorithms for Middleware

by Ronald Fagin, Amnon Lotem , Moni Naor - IN PODS , 2001
"... Assume that each object in a database has m grades, or scores, one for each of m attributes. For example, an object can have a color grade, that tells how red it is, and a shape grade, that tells how round it is. For each attribute, there is a sorted list, which lists each object and its grade under ..."
Abstract - Cited by 717 (4 self) - Add to MetaCart
, which requires large buffers (whose size may grow unboundedly as the database size grows), TA requires only a small, constant-size buffer. TA allows early stopping, which yields, in a precise sense, an approximate version of the top k answers. We distinguish

Synchronous data flow

by Edward A. Lee, et al. , 1987
"... Data flow is a natural paradigm for describing DSP applications for concurrent implementation on parallel hardware. Data flow programs for signal processing are directed graphs where each node represents a function and each arc represents a signal path. Synchronous data flow (SDF) is a special case ..."
Abstract - Cited by 622 (45 self) - Add to MetaCart
of data flow (either atomic or large grain) in which the number of data samples produced or consumed by each node on each invocation is specified a priori. Nodes can be scheduled statically (at compile time) onto single or parallel programmable processors so the run-time overhead usually associated

Token flow control

by Amit Kumar, et al.
"... As companies move towards many-core chips, an efficient onchip communication fabric to connect these cores assumes critical importance. To address limitations to wire delay scalability and increasing bandwidth demands, state-of-the-art on-chip networks use a modular packet-switched design with route ..."
Abstract - Cited by 635 (35 self) - Add to MetaCart
to destination, approaching the communication energy-delaythroughput of dedicated wires. Our detailed implementation analysis shows TFC to be highly scalable and realizable at an aggressive target clock cycle delay of 21FO4 for large networks while requiring low hardware complexity. Evaluations of TFC using both

A First Step towards Automated Detection of Buffer Overrun Vulnerabilities

by David Wagner, Jeffrey S. Foster, Eric A. Brewer, Alexander Aiken - IN NETWORK AND DISTRIBUTED SYSTEM SECURITY SYMPOSIUM , 2000
"... We describe a new technique for finding potential buffer overrun vulnerabilities in security-critical C code. The key to success is to use static analysis: we formulate detection of buffer overruns as an integer range analysis problem. One major advantage of static analysis is that security bugs can ..."
Abstract - Cited by 394 (9 self) - Add to MetaCart
We describe a new technique for finding potential buffer overrun vulnerabilities in security-critical C code. The key to success is to use static analysis: we formulate detection of buffer overruns as an integer range analysis problem. One major advantage of static analysis is that security bugs

Dynamics of Random Early Detection

by Dong Lin, Robert Morris - In Proceedings of ACM SIGCOMM , 1997
"... In this paper we evaluate the effectiveness of Random Early Detection (RED) over traffic types categorized as nonadaptive, fragile and robust, according to their responses to congestion. We point out that RED allows unfair bandwidth sharing when a mixture of the three traffic types shares a link Thi ..."
Abstract - Cited by 465 (1 self) - Add to MetaCart
use. We sl~ow that FRED provides better protection than RED for adaptive uragile and robust) flows. In addition, FRED is able to isolate non-adaptive greedy trafic more effectively. Finally we present a “two-packet-buffer ” gateway mechanism to support a large number of f7ows without incurring

Observations on the dynamics of a congestion control algorithm: The effects of two-way traffic

by Lixia Zhang, Scott Shenker, David D. Clark - In Proceedings of ACM SIGCOMM , 1991
"... We use simulation to study the dynamics of the congestion cent rol algorithm embedded in the BSD 4.3-Tahoe TCP implementation. We investigate the simple case of a few TCP connections, originating and terminating at the same pair of hosts, using a single bottleneck link. This work is an extension of ..."
Abstract - Cited by 383 (6 self) - Add to MetaCart
and gives rise to rapid fluctuations in queue length, and (2) an out-of-phase queue-synchronization mode, which keeps link utilization less than optimal even in the limit of very large buffers. These phenomena are helpful in understanding results from an earlier study of network oscillations ([19]). 1
Next 10 →
Results 1 - 10 of 4,133
Powered by: Apache Solr
  • About CiteSeerX
  • Submit and Index Documents
  • Privacy Policy
  • Help
  • Data
  • Source
  • Contact Us

Developed at and hosted by The College of Information Sciences and Technology

© 2007-2019 The Pennsylvania State University