Sciweavers

1890 search results - page 217 / 378
» A case for network musical performance
Sort
View
WWW
2004
ACM
14 years 9 months ago
Accurate, scalable in-network identification of p2p traffic using application signatures
The ability to accurately identify the network traffic associated with different P2P applications is important to a broad range of network operations including application-specifi...
Subhabrata Sen, Oliver Spatscheck, Dongmei Wang
DMSN
2007
ACM
14 years 4 days ago
A graph-based approach to vehicle tracking in traffic camera video streams
Vehicle tracking has a wide variety of applications, from law enforcement to traffic planning and public safety. However, the image resolution of the videos available from most tr...
Hamid Haidarian Shahri, Galileo Namata, Saket Navl...
CN
2007
103views more  CN 2007»
13 years 8 months ago
A game theoretic comparison of TCP and digital fountain based protocols
In this paper we analyze a novel paradigm of reliable communication which is not based on the traditional timeout-andretransmit mechanism of TCP. Our approach, which we call Fount...
Luis López, Antonio Fernández, Vicen...
SIGMETRICS
2002
ACM
128views Hardware» more  SIGMETRICS 2002»
13 years 7 months ago
High-density model for server allocation and placement
It is well known that optimal server placement is NP-hard. We present an approximate model for the case when both clients and servers are dense, and propose a simple server alloca...
Craig W. Cameron, Steven H. Low, David X. Wei
IPPS
2010
IEEE
13 years 6 months ago
BitTorrent and fountain codes: friends or foes?
Abstract--BitTorrent is the most popular file sharing protocol on the Internet. It is proved that its performance are nearoptimal for generic file distribution when the overlay is ...
Salvatore Spoto, Rossano Gaeta, Marco Grangetto, M...