Sciweavers

2500 search results - page 135 / 500
» Inclusion-Exclusion and Network Reliability
Sort
View
SENSYS
2004
ACM
14 years 3 months ago
The dynamic behavior of a data dissemination protocol for network programming at scale
To support network programming, we present Deluge, a reliable data dissemination protocol for propagating large data objects from one or more source nodes to many other nodes over...
Jonathan W. Hui, David E. Culler
COMCOM
2006
120views more  COMCOM 2006»
13 years 10 months ago
Explicit routing in multicast overlay networks
Application Level Multicast is a promising approach to overcome the deployment problems of IP level multicast by establishing delivery trees using overlay links among end systems....
Torsten Braun, Vijay Arya, Thierry Turletti
ICC
2009
IEEE
122views Communications» more  ICC 2009»
14 years 5 months ago
A Partial-Protection Approach Using Multipath Provisioning
—We study the problem of reliably provisioning traffic using multipath routing in a mesh network. Traditional approaches handled reliability requirements using full-protection s...
Ananya Das, Charles U. Martel, Biswanath Mukherjee
DSN
2003
IEEE
14 years 3 months ago
Human-Machine Diversity in the Use of Computerised Advisory Systems: A Case Study
Computer-based advisory systems form with their users composite, human-machine systems. Redundancy and diversity between the human and the machine are often important for the depe...
Lorenzo Strigini, Andrey Povyakalo, Eugenio Alberd...
DSN
2002
IEEE
14 years 3 months ago
A Realistic Look At Failure Detectors
This paper shows that, in an environment where we do not bound the number of faulty processes, the class P of Perfect failure detectors is the weakest (among realistic failure det...
Carole Delporte-Gallet, Hugues Fauconnier, Rachid ...