Sciweavers

1506 search results - page 99 / 302
» Application Deployment in Virtual Networks Using the X-Bone
Sort
View
P2P
2007
IEEE
161views Communications» more  P2P 2007»
14 years 3 months ago
The BitCod Client: A BitTorrent Clone using Network Coding
Network coding is an emerging field of research with sound and mature theory supporting it. Recent works shows that it has many benefits like improved fault tolerance, higher ...
Danny Bickson, Roy Borer
NOCS
2009
IEEE
14 years 3 months ago
Flow-aware allocation for on-chip networks
Current Virtual-Channel routers disregard potentially useful information about on-chip communication flows. This often leads to inefficient resource utilisation in existing Netwo...
Arnab Banerjee, Simon W. Moore
COMPSEC
2006
110views more  COMPSEC 2006»
13 years 9 months ago
Uncovering identities: A study into VPN tunnel fingerprinting
Operating System fingerprinting is a reconnaissance method which can be used by attackers or forensic investigators. It identifies a system's identity by observing its respon...
Vafa D. Izadinia, Derrick G. Kourie, Jan H. P. Elo...
IPSN
2003
Springer
14 years 2 months ago
Acoustic Target Tracking Using Tiny Wireless Sensor Devices
With the advancement of MEMS technologies, wireless networks consist of tiny sensor devices hold the promise of revolutionizing sensing in a wide range of application domains becau...
Qixin Wang, Wei-Peng Chen, Rong Zheng, Kihwal Lee,...
LCN
2008
IEEE
14 years 3 months ago
Experimental comparison of peer-to-peer streaming overlays: An application perspective
—Peer-to-peer streaming systems are becoming highly popular for IP Television (IPTV). Most systems can be categorized as either tree-based or mesh-based, and as either pushbased ...
Jeff Seibert, David Zage, Sonia Fahmy, Cristina Ni...