Sciweavers

1016 search results - page 114 / 204
» Explore or Exploit
Sort
View
PAM
2011
Springer
12 years 12 months ago
On the Feasibility of Bandwidth Detouring
Internet applications that route data over default Internet paths can often increase performance by sending their traffic over alternative “detour” paths. Previous work has sho...
Thom Haddow, Sing Wang Ho, Jonathan Ledlie, Cristi...
ICPR
2010
IEEE
14 years 4 months ago
Continuous Markov Random Field Optimization using Fusion Move Driven Markov Chain Monte Carlo Technique
Many vision applications have been formulated as Markov Random Field (MRF) problems. Although many of them are discrete labeling problems, continuous formulation often achieves gre...
Wonsik Kim (Seoul National University), Kyoung Mu ...
PERCOM
2009
ACM
14 years 4 months ago
Localizing Jammers in Wireless Networks
Abstract—Wireless communication is susceptible to radio interference and jamming attacks, which prevent the reception of communications. Most existing anti-jamming work does not ...
Hongbo Liu, Wenyuan Xu, Yingying Chen, Zhenhua Liu
GLOBECOM
2008
IEEE
14 years 3 months ago
Understanding P2P-TV Systems Through Real Measurements
—In this paper, we consider two popular peer-to-peer TV (P2P-TV) systems: PPLive, one of the today most widely used P2P-TV systems, and Joost, a promising new generation applicat...
Delia Ciullo, Marco Mellia, Michela Meo, Emilio Le...
CLUSTER
2004
IEEE
14 years 27 days ago
Scalable, high-performance NIC-based all-to-all broadcast over Myrinet/GM
All-to-all broadcast is one of the common collective operations that involve dense communication between all processes in a parallel program. Previously, programmable Network Inte...
Weikuan Yu, Dhabaleswar K. Panda, Darius Buntinas