An adaptive wrapper algorithm for file transfer applications to support optimal large file transfers
The overall file transmission time between peer machines is affected by network conditions, file dispatching and retrieval systems, error detection and the processing capabilities of the peers. Improving the network condition or the peers' processing capabilities for speedup will incur higher c...
| Main Authors: | Ghobadi, Alireza, Eswaran, C., Muthuvelu, Nithiapidary, Tan, Ian K. T., Kee, Yong Lee |
|---|---|
| Format: | Book Section |
| Language: | English |
| Published: |
Electronics Telecommunications Research Inst, 161 Kajong-Dong, Yusong-Gu, Taejon, 305-350, South Korea
2009
|
| Subjects: | |
| Online Access: | http://shdl.mmu.edu.my/1899/ http://shdl.mmu.edu.my/1899/1/An%20adaptive%20wrapper%20algorithm%20for%20file%20transfer%20applications%20to%20support%20optimal%20large%20file%20transfers.pdf |
Similar Items
An adaptive and parameterized job grouping algorithm for scheduling grid jobs
by: Nithiapidary, Muthuvelu, et al.
Published: (2008)
by: Nithiapidary, Muthuvelu, et al.
Published: (2008)
Initial File-Placement In Data Grid Environment Using Game Theory And Fictitious Play
by: Indrayanto, Aloysius
Published: (2008)
by: Indrayanto, Aloysius
Published: (2008)
Feature Selection Method Based On Hybrid Filter-Metaheuristic Wrapper Approach
by: Jothi, Neesha
Published: (2020)
by: Jothi, Neesha
Published: (2020)
Compute Language Interface: A Transparent Wrapper Library For Multi Cpu-Gpu
by: Ooi, Keng Siang
Published: (2013)
by: Ooi, Keng Siang
Published: (2013)
Structures (struct) and files
by: Shah, Asadullah, et al.
Published: (2011)
by: Shah, Asadullah, et al.
Published: (2011)
Throughput-Received Power Relationship for File Transfer Protocol (FTP) Service in Wireless Mesh Network (WMN)
by: Zakaria, Mohd Sharim, et al.
Published: (2010)
by: Zakaria, Mohd Sharim, et al.
Published: (2010)
Short Text Classification Using An Enhanced Term Weighting Scheme And Filter-Wrapper Feature Selection
by: Alsmadi, Issa Mohammad Ibrahim
Published: (2018)
by: Alsmadi, Issa Mohammad Ibrahim
Published: (2018)
Sending the output to a print file
by: Shah, Asadullah, et al.
Published: (2011)
by: Shah, Asadullah, et al.
Published: (2011)
Trusting Cloud Computing for Personal Files
by: Mazlina, Abdul Majid, et al.
Published: (2014)
by: Mazlina, Abdul Majid, et al.
Published: (2014)
New approach of hidden data in the portable executable file without change the size of carrier file using statistical technique
by: Naji, Ahmed Wathik, et al.
Published: (2009)
by: Naji, Ahmed Wathik, et al.
Published: (2009)
Read data from a file
by: Shah, Asadullah, et al.
Published: (2011)
by: Shah, Asadullah, et al.
Published: (2011)
Steganography: Text File Hiding in Image
by: Yaw Choon, Kit
Published: (2013)
by: Yaw Choon, Kit
Published: (2013)
Protecting an Internet Web File using Java
by: Taha, Imad, et al.
Published: (2004)
by: Taha, Imad, et al.
Published: (2004)
Digital filing and file control system (DFFCS)
by: Teh, Suet Khim
Published: (2005)
by: Teh, Suet Khim
Published: (2005)
Anomaly detection in system log files using machine learning algorithms / Zahedeh Zamanian
by: Zahedeh, Zamanian
Published: (2019)
by: Zahedeh, Zamanian
Published: (2019)
Information hiding in multimedia files : a literature review
by: Ali Ja’far, Abdullah Mohammed Abdo, et al.
Published: (2006)
by: Ali Ja’far, Abdullah Mohammed Abdo, et al.
Published: (2006)
The impact of file sharing based on the peer-to-peer technology
by: Raja Shaharuddin, Raja Aida, et al.
Published: (2002)
by: Raja Shaharuddin, Raja Aida, et al.
Published: (2002)
Data Transfer Management In Grid-Based Mass Storage Environment.
by: Sumari, Putra, et al.
Published: (2004)
by: Sumari, Putra, et al.
Published: (2004)
File transfer using mobile agent / Radin Izzatul Muna Ahmad Zabidi
by: Ahmad Zabidi, Radin Izzatul Muna
Published: (2004)
by: Ahmad Zabidi, Radin Izzatul Muna
Published: (2004)
Testing file
by: Ilina, Musa
Published: (2014)
by: Ilina, Musa
Published: (2014)
Corrupt File
by: Cinanni, Gina
Published: (2013)
by: Cinanni, Gina
Published: (2013)
Novel approach for secure cover file of hidden data in the unused area within EXE file using computation between cryptography and steganography
by: Naji, Ahmed Wathik, et al.
Published: (2009)
by: Naji, Ahmed Wathik, et al.
Published: (2009)
Visualization of automated plate cutting operation using DXF file
by: Abd. Rahim, Norazura
Published: (2008)
by: Abd. Rahim, Norazura
Published: (2008)
Input and selected output files for simulations of sunset yellow dimers
by: Carter, Damien, et al.
Published: (2014)
by: Carter, Damien, et al.
Published: (2014)
An Adaptive Error Modeling Scheme for the Lossless Compression of EEG Signals
by: Sriraam, N., et al.
Published: (2008)
by: Sriraam, N., et al.
Published: (2008)
Dynamics of watermark position in audio watermarked
files using neural networks
by: Abubakar, Adamu, et al.
Published: (2017)
by: Abubakar, Adamu, et al.
Published: (2017)
File integrity monitor scheduling based on file security level classification
by: Abdullah, Zul Hilmi, et al.
Published: (2011)
by: Abdullah, Zul Hilmi, et al.
Published: (2011)
Adapting Artificial Immune Algorithms For University Timetabling
by: Malim , Muhammad Rozi
Published: (2009)
by: Malim , Muhammad Rozi
Published: (2009)
Concealment of files blocked by Gmail with EOF-based image steganography
by: Taufik, Ichsan, et al.
Published: (2018)
by: Taufik, Ichsan, et al.
Published: (2018)
A development of online document retention system of course file / Norliyati Rohman
by: Rohman, Norliyati
Published: (2006)
by: Rohman, Norliyati
Published: (2006)
Comparison of file sanitization techniques in usb based on average file entropy valves
by: Onn, Nur Amanina
Published: (2018)
by: Onn, Nur Amanina
Published: (2018)
Comparison of file sanitization techniques in USB based on average file entropy values
by: Onn, Nur Amanina
Published: (2018)
by: Onn, Nur Amanina
Published: (2018)
A Comparative Study on Compression of Different Image File Formats
by: Ooi, Poh San
Published: (1999)
by: Ooi, Poh San
Published: (1999)
Challenges of hidden data in the unused area two within executable files
by: Naji, Ahmed Wathik, et al.
Published: (2009)
by: Naji, Ahmed Wathik, et al.
Published: (2009)
Input and selected output files for simulations of benzene adsorbed on the Cu (111) surface
by: Carter, Damien, et al.
Published: (2014)
by: Carter, Damien, et al.
Published: (2014)
Solving Radiative Transfer Equation (RTE) in Time-Dependent Mode
by: Ow Shen, Wah, et al.
Published: (2008)
by: Ow Shen, Wah, et al.
Published: (2008)
A Platform Independent Web-Based Data Managementn System For Random Access File
by: Ku, Day Chyi
Published: (2002)
by: Ku, Day Chyi
Published: (2002)
Adapting and enhancing mussels wandering optimization algorithm for supervised training of neural networks
by: Abusnaina, Ahmed A. A.
Published: (2015)
by: Abusnaina, Ahmed A. A.
Published: (2015)
Modulation Transfer Function Compensation
Through A Modified Wiener Filter
For Spatial Image Quality Improvement
by: Wong , Soo Mee
Published: (2010)
by: Wong , Soo Mee
Published: (2010)
Modulation Transfer Function Compensation Through A Modified Wiener Filter For Spatial Image Quality Improvement.
by: Wong, Soo Mee
Published: (2010)
by: Wong, Soo Mee
Published: (2010)
Similar Items
-
An adaptive and parameterized job grouping algorithm for scheduling grid jobs
by: Nithiapidary, Muthuvelu, et al.
Published: (2008) -
Initial File-Placement In Data Grid Environment Using Game Theory And Fictitious Play
by: Indrayanto, Aloysius
Published: (2008) -
Feature Selection Method Based On Hybrid Filter-Metaheuristic Wrapper Approach
by: Jothi, Neesha
Published: (2020) -
Compute Language Interface: A Transparent Wrapper Library For Multi Cpu-Gpu
by: Ooi, Keng Siang
Published: (2013) -
Structures (struct) and files
by: Shah, Asadullah, et al.
Published: (2011)