Sciweavers

3083 search results - page 607 / 617
» Active Peer to Peer
Sort
View
CORR
2008
Springer
112views Education» more  CORR 2008»
13 years 7 months ago
SecMon: End-to-End Quality and Security Monitoring System
The Voice over Internet Protocol (VoIP) is becoming a more available and popular way of communicating for Internet users. This also applies to Peer-to-Peer (P2P) systems and mergi...
Tomasz Ciszkowski, Charlott Eliasson, Markus Fiedl...
DEBU
2008
100views more  DEBU 2008»
13 years 7 months ago
WAVE: Automatic Verification of Data-Driven Web Services
Data-driven Web services, viewed broadly as interactive systems available on the Web for users and programs, provide the backbone for increasingly complex Web applications. While ...
Alin Deutsch, Victor Vianu
CN
2006
70views more  CN 2006»
13 years 7 months ago
Preventing persistent oscillations and loops in IBGP configuration with route reflection
Abstract-- Internal Border Gateway Protocol (IBGP) is responsible for distributing external reachability information, obtained via External-BGP (EBGP) sessions, within an autonomou...
Anuj Rawat, Mark A. Shayman
CN
2006
61views more  CN 2006»
13 years 7 months ago
Structuring topologically aware overlay networks using domain names
Abstract-- Overlay networks are application layer systems which facilitate users in performing distributed functions such as searches over the contents of other users. An important...
Demetrios Zeinalipour-Yazti, Vana Kalogeraki
BMCBI
2007
145views more  BMCBI 2007»
13 years 7 months ago
The utility of MAS5 expression summary and detection call algorithms
Background: Used alone, the MAS5.0 algorithm for generating expression summaries has been criticized for high False Positive rates resulting from exaggerated variance at low inten...
Stuart D. Pepper, Emma K. Saunders, Laura E. Edwar...