Sciweavers

4435 search results - page 861 / 887
» Algorithms, games, and the internet
Sort
View
P2P
2008
IEEE
102views Communications» more  P2P 2008»
14 years 4 months ago
Free-Riding, Fairness, and Firewalls in P2P File-Sharing
Peer-to-peer file-sharing networks depend on peers uploading data to each other. Some peers, called free-riders, will not upload data unless there is an incentive to do so. Algor...
Jacob Jan-David Mol, Johan A. Pouwelse, Dick H. J....
ICEBE
2007
IEEE
126views Business» more  ICEBE 2007»
14 years 4 months ago
Consumer-Centric Web Services Discovery and Subscription
Nowadays, there are a number of similar web services over the internet or intranet. They provide consumers with more choices according to their personalized QoS requirements. Howe...
Xuanzhe Liu, Li Zhou, Gang Huang, Hong Mei
INFOCOM
2007
IEEE
14 years 4 months ago
Two-Tier Load Balancing in OSPF Wireless Back-Hauls
Abstract— High-speed wireless communication technology (e.g. WiMAX) makes it feasible and cost-effective to build wireless back-hauls for Internet access. Compared to wired count...
Xiaowen Zhang, Hao Zhu
CIVR
2007
Springer
138views Image Analysis» more  CIVR 2007»
14 years 4 months ago
SemRetriev: an ontology driven image retrieval system
This paper describes the technical details of SemRetriev, a prototype system for image retrieval which combines the use of an ontology which structures an image repository and of ...
Adrian Popescu, Pierre-Alain Moëllic, Christo...
ESORICS
2007
Springer
14 years 4 months ago
Cloak: A Ten-Fold Way for Reliable Covert Communications
A number of network covert channels have been proposed recently that may have important ramifications for Internet security and privacy. However, they could become ineffective in...
Xiapu Luo, Edmond W. W. Chan, Rocky K. C. Chang