Sciweavers

1647 search results - page 216 / 330
» Distributing private data in challenged network environments
Sort
View
ICIP
2004
IEEE
16 years 6 months ago
Minimizing distortion for multi-path video streaming over ad hoc networks
We present a video distortion model analyzing the performance of multi-path routing for low latency video streaming, in congestion-limited ad hoc networks. In such environments, a...
Eric Setton, Xiaoqing Zhu, Bernd Girod
BTW
2007
Springer
152views Database» more  BTW 2007»
15 years 10 months ago
Armada: a Reference Model for an Evolving Database System
Abstract: The data on the web, in digital libraries, in scientific repositories, etc. continues to grow at an increasing rate. Distribution is a key solution to overcome this data...
Fabian Groffen, Martin L. Kersten, Stefan Manegold
ICDE
2006
IEEE
190views Database» more  ICDE 2006»
15 years 10 months ago
Ant Algorithms for Search in Unstructured Peer-to-Peer Networks
Although the ant metaphor has been successfully applied to routing of data packets both in wireless and fixed networks, little is yet known about its applicability to the task of...
Elke Michlmayr
MSS
1999
IEEE
121views Hardware» more  MSS 1999»
15 years 8 months ago
Device Locks: Mutual Exclusion for Storage Area Networks
Device Locks are mechanisms used in distributed environments to facilitate mutual exclusion of shared resources. They can further be used to maintain coherence of data that is cac...
Kenneth W. Preslan, Steven R. Soltis, Christopher ...
141
Voted
WOWMOM
2006
ACM
108views Multimedia» more  WOWMOM 2006»
15 years 10 months ago
Multimedia Correlation Analysis in Unstructured Peer-to-Peer Networks
Recent years saw the rapid development of peer-topeer (P2P) networks in a great variety of applications. However, similarity-based k-nearest-neighbor retrieval (k-NN) is still a c...
Bo Yang, Ali R. Hurson, Yu Jiao, Thomas E. Potok