Sciweavers

4435 search results - page 880 / 887
» Algorithms, games, and the internet
Sort
View
COMCOM
2007
149views more  COMCOM 2007»
13 years 8 months ago
Cache invalidation strategies for internet-based mobile ad hoc networks
Internet-based mobile ad hoc network (IMANET) combines a mobile ad hoc network (MANET) and the Internet to provide universal information accessibility. Although caching frequently...
Sunho Lim, Wang-Chien Lee, Guohong Cao, Chita R. D...
JSA
2008
136views more  JSA 2008»
13 years 8 months ago
Evaluation and optimization of a peer-to-peer video-on-demand system
Video-on-demand (VoD) is increasingly popular with internet users. However, VoD is costly due to the load placed on video servers. Peer-to-peer (P2P) techniques are an approach to...
Bin Cheng, Xiuzheng Liu, Zheng Zhang, Hai Jin, Lex...
JSAC
2008
202views more  JSAC 2008»
13 years 8 months ago
Cognitive Wireless Mesh Networks with Dynamic Spectrum Access
Wireless Mesh Networks (WMNs) are envisaged to extend Internet access and other networking services in personal, local, campus, and metropolitan areas. Mesh routers (MR) form the c...
Kaushik R. Chowdhury, Ian F. Akyildiz
JPDC
2006
253views more  JPDC 2006»
13 years 8 months ago
Collaborative detection and filtering of shrew DDoS attacks using spectral analysis
This paper presents a new spectral template-matching approach to countering shrew distributed denial-of-service (DDoS) attacks. These attacks are stealthy, periodic, pulsing, and ...
Yu Chen, Kai Hwang
SAC
2006
ACM
13 years 8 months ago
Combining supervised and unsupervised monitoring for fault detection in distributed computing systems
Fast and accurate fault detection is becoming an essential component of management software for mission critical systems. A good fault detector makes possible to initiate repair a...
Haifeng Chen, Guofei Jiang, Cristian Ungureanu, Ke...