Sciweavers

126 search results - page 16 / 26
» Efficient Anonymizations with Enhanced Utility
Sort
View
JCP
2008
206views more  JCP 2008»
13 years 7 months ago
SW-R2P: A Trusted Small World Overlay P2P Network with Zero Knowledge Identification
In order to implement both the efficiency and security in the Peer-to-Peer (P2P) network, we design a trusted small world overlay P2P network with the role based and reputation bas...
Yingjie Xia, Guanghua Song, Yao Zheng
COMCOM
2004
113views more  COMCOM 2004»
13 years 7 months ago
A mobile differentiated services QoS model
UMTS networks will be based on the Internet Protocol (IP) to provide an efficient support for applications with bursty traffic characteristics, e.g., WWW browsers. Such IP-based n...
Jörg Diederich, Lars C. Wolf, Martina Zitterb...
MMS
2000
13 years 7 months ago
Failure Recovery Algorithms for Multimedia Servers
In this paper, we present two novel disk failure recovery methods that utilize the inherent characteristics of video streams for efficient recovery. Whereas the first method explo...
Prashant J. Shenoy, Harrick M. Vin
PRESENCE
1998
98views more  PRESENCE 1998»
13 years 7 months ago
The Virtual Venue: User-Computer Interaction in Information-Rich Virtual Environments
We present a virtual environment application that allows users to access embedded information within an immersive virtual space. Due to the richness and complexity of this environ...
Doug A. Bowman, Larry F. Hodges, Jay David Bolter
ICC
2009
IEEE
151views Communications» more  ICC 2009»
13 years 5 months ago
Performance Evaluation of Multiple-Relay Cooperative ARQ Strategies for Mobile Networks
In Cooperative Automatic Repeat reQuest (C-ARQ) protocols, one or more nodes can act as relays, collaborating in the frame retransmission process between a sender and a destination...
Juan J. Alcaraz, Joan García-Haro