Sciweavers

43 search results - page 5 / 9
» A protocol-independent technique for eliminating redundant n...
Sort
View
MM
2005
ACM
179views Multimedia» more  MM 2005»
14 years 1 months ago
rStream: resilient peer-to-peer streaming with rateless codes
The inherent instability and unreliability of peer-to-peer networks introduce several fundamental engineering challenges to multimedia streaming over peer-to-peer networks. First,...
Chuan Wu, Baochun Li
WICON
2008
13 years 9 months ago
Denial of service vulnerabilities in the 802.16 protocol
This paper examines the denial of service attacks that an 802.16 Broadband Wireless Access network is susceptible to at the physical and medium access control layers. In our threa...
Siddharth Maru, Timothy X. Brown
MUE
2007
IEEE
71views Multimedia» more  MUE 2007»
14 years 1 months ago
Query Predicate Preprocessing in Wireless Sensor Networks
With the developments of related techniques in telecommunication and computer sciences, wireless sensor networks have been used more and more widely. While sensor nodes in wireles...
Min Meng, Hui Xu, Byeong-Soo Jeong, Sungyoung Lee,...
WETICE
2006
IEEE
14 years 1 months ago
A Hybrid P2P Protocol for Real-Time Collaboration
Peer-to-Peer architecture is currently an attractive solution for facilitating the use of collaboration software without any server. Multicasting is usually proposed for group com...
Dewan Tanvir Ahmed, Shervin Shirmohammadi
ISM
2006
IEEE
132views Multimedia» more  ISM 2006»
13 years 7 months ago
BM-ALM: An Application Layer Multicasting with Behavior Monitoring Approach
IP multicasting is the most efficient way to perform group data distribution, as it eliminates traffic redundancy and improves bandwidth utilization. Application Layer Multicast (...
Dewan Tanvir Ahmed, Shervin Shirmohammadi