Sciweavers

13895 search results - page 2715 / 2779
» Exploring
Sort
View
INFOCOM
2010
IEEE
13 years 6 months ago
Chameleon: Adaptive Peer-to-Peer Streaming with Network Coding
—Layered streaming can be used to adapt to the available download capacity of an end-user, and such adaptation is very much required in real world HTTP media streaming. The multi...
Anh Tuan Nguyen, Baochun Li, Frank Eliassen
INFOCOM
2010
IEEE
13 years 6 months ago
Joint Energy Management and Resource Allocation in Rechargeable Sensor Networks
—Energy harvesting sensor platforms have opened up a new dimension to the design of network protocols. In order to sustain the network operation, the energy consumption rate cann...
Ren-Shiou Liu, Prasun Sinha, Can Emre Koksal
INFOCOM
2010
IEEE
13 years 6 months ago
BitTorrent Darknets
Abstract—A private BitTorrent site (also known as a “BitTorrent darknet”) is a collection of torrents that can only be accessed by members of the darknet community. The priva...
Chao Zhang, Prithula Dhungel, Di Wu, Zhengye Liu, ...
INFOCOM
2010
IEEE
13 years 6 months ago
A Node-failure-resilient Anonymous Communication Protocol through Commutative Path Hopping
Abstract—With rising concerns on user privacy over the Internet, anonymous communication systems that hide the identity of a participant from its partner or third parties are hig...
Fengjun Li, Bo Luo, Peng Liu, Chao-Hsien Chu
ISCA
2010
IEEE
232views Hardware» more  ISCA 2010»
13 years 6 months ago
Evolution of thread-level parallelism in desktop applications
As the effective limits of frequency and instruction level parallelism have been reached, the strategy of microprocessor vendors has changed to increase the number of processing ...
Geoffrey Blake, Ronald G. Dreslinski, Trevor N. Mu...
« Prev « First page 2715 / 2779 Last » Next »