Sciweavers

1661 search results - page 257 / 333
» Distributed Top-K Monitoring
Sort
View
INFOCOM
2005
IEEE
14 years 3 months ago
On the effectiveness of DDoS attacks on statistical filtering
— Distributed Denial of Service (DDoS) attacks pose a serious threat to service availability of the victim network by severely degrading its performance. Recently, there has been...
Qiming Li, Ee-Chien Chang, Mun Choon Chan
INFOCOM
2005
IEEE
14 years 3 months ago
SMART: a scan-based movement-assisted sensor deployment method in wireless sensor networks
— The efficiency of sensor networks depends on the coverage of the monitoring area. Although in general a sufficient number of sensors are used to ensure a certain degree of re...
Jie Wu, Shuhui Yang
P2P
2005
IEEE
112views Communications» more  P2P 2005»
14 years 3 months ago
Randomized Protocols for Duplicate Elimination in Peer-to-Peer Storage Systems
Distributed peer-to-peer systems rely on voluntary participation of peers to effectively manage a storage pool. In such systems, data is generally replicated for performance and a...
Ronaldo A. Ferreira, Murali Krishna Ramanathan, An...
ANCS
2005
ACM
14 years 3 months ago
Architectural impact of stateful networking applications
The explosive and robust growth of the Internet owes a lot to the ”end-to-end principle”, which pushes stateful operations to the end-points. The Internet grew both in traffic...
Javier Verdú, Jorge García-Vidal, Ma...
MM
2005
ACM
152views Multimedia» more  MM 2005»
14 years 3 months ago
A repeated video clip identification system
Identifying short repeated video clips, such as news program logo, station logo, TV commercials, etc., from broadcasting video databases or streams is important for video content ...
Xianfeng Yang, Ping Xue, Qi Tian