Sciweavers

410 search results - page 58 / 82
» A micro-ethical view on computing practice
Sort
View
IPOM
2007
Springer
15 years 9 months ago
Analysis of BGP Origin AS Changes Among Brazil-Related Autonomous Systems
Abstract. On the inter-domain Internet today, the address prefix origin in our BGP operations has become a major security concern. This critical problem can be stated simply as ...
Shih-Ming Tseng, Ke Zhang, Shyhtsun Felix Wu, Kwan...
SCALESPACE
2007
Springer
15 years 9 months ago
A Generic Approach to the Filtering of Matrix Fields with Singular PDEs
Abstract. There is an increasing demand to develop image processing tools for the filtering and analysis of matrix-valued data, so-called matrix fields. In the case of scalar-val...
Bernhard Burgeth, Stephan Didas, Luc Florack, Joac...
ICPADS
2005
IEEE
15 years 9 months ago
Distributed Spanning Tree Algorithms for Large Scale Traversals
— The Distributed Spanning Tree (DST) is an overlay structure designed to be scalable. It supports the growth from small scale to large scale. The DST is a tree without bottlenec...
Sylvain Dahan
NETGAMES
2005
ACM
15 years 9 months ago
A distributed event delivery method with load balancing for MMORPG
In this paper, we propose a new distributed event delivery method for MMORPG (Massively Multiplayer Online Role Playing Games). In our method, the whole game space is divided into...
Shinya Yamamoto, Yoshihiro Murata, Keiichi Yasumot...
NOSSDAV
2005
Springer
15 years 9 months ago
Peer-to-peer internet telephony using SIP
P2P systems inherently have high scalability, robustness and fault tolerance because there is no centralized server and the network self-organizes itself. This is achieved at the ...
Kundan Singh, Henning Schulzrinne