Sciweavers

2057 search results - page 101 / 412
» From content distribution networks to content networks - iss...
Sort
View
ICNP
1998
IEEE
14 years 4 days ago
Distributed Network Flow Control based on Dynamic Competitive Markets
Network applications require a certain level of network performance for their proper operation. These individual guarantees can be provided if su cient amounts of network resource...
Errin W. Fulp, Douglas S. Reeves
PEWASUN
2004
ACM
14 years 1 months ago
An M/MMGI/1/K queuing model for IEEE 802.11 ad hoc networks
An M/MMGI/1/K queuing model is developed for the analysis of IEEE 802.11 DCF using RTS/CTS. Results are based on arbitrary contention conditions, namely, collision probabilities, ...
Mustafa Özdemir, A. Bruce McDonald
ISCAS
2006
IEEE
100views Hardware» more  ISCAS 2006»
14 years 1 months ago
Unequal authenticity protection (UAP) for rate-distortion-optimized secure streaming of multimedia over wireless networks
— This paper presents a new notion of authenticating degraded multimedia content streamed over wireless networks – Unequal Authenticity Protection (UAP). Multimedia content dif...
Zhi Li, Qibin Sun, Yong Lian
PAM
2010
Springer
13 years 9 months ago
A Longitudinal View of HTTP Traffic
Abstract. In this paper we analyze three and a half years of HTTP traffic observed at a small research institute to characterize the evolution of various facets of web operation. W...
Tom Callahan, Mark Allman, Vern Paxson
CONEXT
2008
ACM
13 years 9 months ago
Understanding the characteristics of online commenting
In this poster, we investigate the characteristics of online commenting behaviors which can influence on the popularity of various online contents, such as user created contents. ...
Jong Gun Lee, Kavé Salamatian