Sciweavers

828 search results - page 112 / 166
» A Network Coding Approach to Secret Key Distribution
Sort
View
122
Voted
INFOCOM
2003
IEEE
15 years 8 months ago
Pseudo Likelihood Estimation in Network Tomography
Abstract— Network monitoring and diagnosis are key to improving network performance. The difficulties of performance monitoring lie in today’s fast growing Internet, accompani...
Gang Liang, Bin Yu
MOMM
2009
ACM
129views Communications» more  MOMM 2009»
15 years 7 months ago
Sharing large data collections between mobile peers
New directions in the provision of end-user computing experiences mean that we need to determine the best way to share data between small mobile computing devices. Partitioning la...
Brian Tripney, Christopher Foley, Richard Gourlay,...
134
Voted
DCC
2008
IEEE
15 years 2 months ago
A Reliable Chunkless Peer-to-Peer Architecture for Multimedia Streaming
In this paper we propose a chunkless structure for multimedia distribution over peer-to-peer networks. With the proposed approach, the original multimedia packets are partitioned ...
Riccardo Bernardini, Roberto Rinaldo, Andrea Vital...
171
Voted
SEM
2004
Springer
15 years 8 months ago
PlanetSim: A New Overlay Network Simulation Framework
Abstract. Current research in peer to peer systems is lacking appropriate environments for simulation and experimentation of large scale overlay services. This has led to a plethor...
Pedro García López, Carles Pairot, R...
173
Voted
MOBIHOC
2007
ACM
16 years 2 months ago
Bounds for the capacity of wireless multihop networks imposed by topology and demand
Existing work on the capacity of wireless networks predominantly considers homogeneous random networks with random work load. The most relevant bounds on the network capacity, e.g...
Alireza Keshavarz-Haddad, Rudolf H. Riedi