Sciweavers

1524 search results - page 284 / 305
» Computing effective communication policies in multiagent sys...
Sort
View
P2P
2008
IEEE
135views Communications» more  P2P 2008»
14 years 1 months ago
Popularity-Aware Prefetch in P2P Range Caching
Unstructured peer-to-peer infrastructure has been widely employed to support large-scale distributed applications. Many of these applications, such as locationbased services and m...
Qiang Wang, Khuzaima Daudjee, M. Tamer Özsu
MM
2005
ACM
179views Multimedia» more  MM 2005»
14 years 29 days ago
rStream: resilient peer-to-peer streaming with rateless codes
The inherent instability and unreliability of peer-to-peer networks introduce several fundamental engineering challenges to multimedia streaming over peer-to-peer networks. First,...
Chuan Wu, Baochun Li
CCS
2005
ACM
14 years 28 days ago
Exploiting open functionality in SMS-capable cellular networks
Cellular networks are a critical component of the economic and social infrastructures in which we live. In addition to voice services, these networks deliver alphanumeric text mes...
William Enck, Patrick Traynor, Patrick McDaniel, T...
VRML
2003
ACM
14 years 19 days ago
Implementation of a scripting language for VRML/X3D-based embodied agents
Embodied agents or humanoid avatars may effectively be used to communicate with human users. Currently there is a wide range of specification formalisms and scripting languages f...
Zhisheng Huang, Anton Eliëns, Cees T. Visser
CCR
2008
86views more  CCR 2008»
13 years 7 months ago
The need for simulation in evaluating anomaly detectors
Anomalous events that affect the performance of networks are a fact of life. It is therefore not surprising that recent years have seen an explosion in research on network anomaly...
Haakon Ringberg, Matthew Roughan, Jennifer Rexford