Sciweavers

10819 search results - page 2051 / 2164
» Addition and multiplication of sets
Sort
View
INFOCOM
2008
IEEE
14 years 4 months ago
Inside the New Coolstreaming: Principles, Measurements and Performance Implications
—The Peer-to-Peer (P2P) based video streaming has emerged as a promising solution for Internet video distribution. Leveraging the resource available at end users, this approach p...
Bo Li, Susu Xie, Yang Qu, Gabriel Yik Keung, Chuan...
INFOCOM
2008
IEEE
14 years 4 months ago
Feasible Rate Allocation in Wireless Networks
—Rate allocation is a fundamental problem in the operation of a wireless network because of the necessity to schedule the operation of mutually interfering links between the node...
Ramakrishna Gummadi, Kyomin Jung, Devavrat Shah, R...
MICRO
2008
IEEE
103views Hardware» more  MICRO 2008»
14 years 4 months ago
Testudo: Heavyweight security analysis via statistical sampling
Heavyweight security analysis systems, such as taint analysis and dynamic type checking, are powerful technologies used to detect security vulnerabilities and software bugs. Tradi...
Joseph L. Greathouse, Ilya Wagner, David A. Ramos,...
SP
2008
IEEE
112views Security Privacy» more  SP 2008»
14 years 4 months ago
XFA: Faster Signature Matching with Extended Automata
Automata-based representations and related algorithms have been applied to address several problems in information security, and often the automata had to be augmented with additi...
Randy Smith, Cristian Estan, Somesh Jha
WCNC
2008
IEEE
14 years 4 months ago
Distributed Energy Efficient Spectrum Access in Wireless Cognitive Radio Sensor Networks
—In this paper, a wireless cognitive radio sensor network is considered, where each sensor node is equipped with cognitive radio and the network is a multi-carrier system operati...
Song Gao, Lijun Qian, Dhadesugoor R. Vaman
« Prev « First page 2051 / 2164 Last » Next »