Sciweavers

976 search results - page 145 / 196
» Available Bandwidth Measurement Schemes over Networks
Sort
View
162
Voted
CCR
2011
14 years 10 months ago
Application flow control in YouTube video streams
This paper presents the results of an investigation into the application flow control technique utilised by YouTube. We reveal and describe the basic properties of YouTube applic...
Shane Alcock, Richard Nelson
135
Voted
MOBISYS
2010
ACM
15 years 6 months ago
Anatomizing application performance differences on smartphones
The use of cellular data networks is increasingly popular due to the widespread deployment of 3G technologies and the rapid adoption of smartphones, such as iPhone and GPhone. Bes...
Junxian Huang, Qiang Xu, Birjodh Tiwana, Zhuoqing ...
118
Voted
ADHOC
2007
104views more  ADHOC 2007»
15 years 3 months ago
An overlay approach to data security in ad-hoc networks
While it has been argued that application-layer overlay protocols can enhance services in mobile ad-hoc networks, hardly any empirical data is available on the throughput and dela...
Jörg Liebeherr, Guangyu Dong
118
Voted
INFOCOM
2007
IEEE
15 years 10 months ago
Insider Attacker Detection in Wireless Sensor Networks
— Though destructive to network functions, insider attackers are not detectable with only the classic cryptographybased techniques. Many mission-critic sensor network application...
Fang Liu, Xiuzhen Cheng, Dechang Chen
114
Voted
CCGRID
2006
IEEE
15 years 9 months ago
The Computational and Storage Potential of Volunteer Computing
“Volunteer computing” uses Internet-connected computers, volunteered by their owners, as a source of computing power and storage. This paper studies the potential capacity of ...
David P. Anderson, Gilles Fedak