Sciweavers

479 search results - page 55 / 96
» Implementation and Evaluation of On-Chip Network Architectur...
Sort
View
GLOBECOM
2007
IEEE
14 years 1 months ago
Discovering Topologies at Router Level: Part II
—Measurement and monitoring of network topologies are essential tasks in current network scenarios. Indeed, due to their utility in planning, management, security, and reliabilit...
Alessio Botta, Walter de Donato, Antonio Pescap&eg...
MM
2005
ACM
121views Multimedia» more  MM 2005»
14 years 1 months ago
Impact of incentive mechanisms on quality of experience
Since entities participating in P2P networks are usually autonomous and therefore free to decide on their level of participation, mechanisms to resolve conflicts between individu...
Andrew Roczniak, Abdulmotaleb El-Saddik
INFOCOM
2007
IEEE
14 years 1 months ago
Lava: A Reality Check of Network Coding in Peer-to-Peer Live Streaming
—In recent literature, network coding has emerged as a promising information theoretic approach to improve the performance of both peer-to-peer and wireless networks. It has been...
Mea Wang, Baochun Li
ASWEC
2007
IEEE
13 years 11 months ago
Explicitly Controlling the Fair Service for Busy Web Servers
There is a growing demand for web applications to provide fair service to the highly concurrent requests. In this paper, we present an approach to addressing this requirement. Bas...
Zhanwen Li, David Levy, Shiping Chen, John Zic
AAMAS
2006
Springer
13 years 7 months ago
CONFIDANT: Collaborative Object Notification Framework for Insider Defense using Autonomous Network Transactions
File Integrity Analyzers serve as a component of an Intrusion Detection environment by performing filesystem inspections to verify the content of security-critical files in order ...
Adam J. Rocke, Ronald F. DeMara