Sciweavers

763 search results - page 18 / 153
» An Improved Network Broadcasting Method Based on Gnutella Ne...
Sort
View
ADHOCNOW
2004
Springer
14 years 4 days ago
Weathering the Storm: Managing Redundancy and Security in Ad Hoc Networks
Many ad hoc routing algorithms rely on broadcast flooding for location discovery or more generally for secure routing applications, particularly when dealing with Byzantine threat...
Mike Burmester, Tri Van Le, Alec Yasinsac
TON
2010
163views more  TON 2010»
13 years 5 months ago
Toward practical opportunistic routing with intra-session network coding for mesh networks
—We consider opportunistic routing in wireless mesh networks. We exploit the inherent diversity of the broadcast nature of wireless by making use of multi-path routing. We presen...
Bozidar Radunovic, Christos Gkantsidis, Peter B. K...
IMC
2004
ACM
14 years 5 days ago
Characterizing the query behavior in peer-to-peer file sharing systems
This paper characterizes the query behavior of peers in a peer-topeer (P2P) file sharing system. In contrast to previous work, which provides various aggregate workload statistics...
Alexander Klemm, Christoph Lindemann, Mary K. Vern...
ICCD
2003
IEEE
111views Hardware» more  ICCD 2003»
14 years 3 months ago
Routed Inter-ALU Networks for ILP Scalability and Performance
Modern processors rely heavily on broadcast networks to bypass instruction results to dependent instructions in the pipeline. However, as clock rates increase, architectures get w...
Karthikeyan Sankaralingam, Vincent Ajay Singh, Ste...
ICASSP
2009
IEEE
14 years 1 months ago
Data-driven lexicon expansion for Mandarin broadcast news and conversation speech recognition
We present a data-driven framework for expanding the lexicon to improve Mandarin broadcast news and conversation speech recognition. The lexicon expansion includes the generation ...
Xin Lei, Wen Wang, Stolcke Stolcke