Sciweavers

2500 search results - page 161 / 500
» Inclusion-Exclusion and Network Reliability
Sort
View
112
Voted
GLOBECOM
2009
IEEE
15 years 7 months ago
Optimized Protection Schemes for Resilient Interdomain Traffic Distribution
Abstract-- Due to the development of Next Generation Networks, leading to a multiservice transport layer with a multidomain environment, the importance of interconnection issues ke...
Miroslaw Kantor, Piotr Cholda, Andrzej Jajszczyk
124
Voted
RAS
2000
116views more  RAS 2000»
15 years 3 months ago
Collision avoidance using a model of the locust LGMD neuron
The lobula giant movement detector (LGMD) system in the locust responds selectively to objects approaching the animal on a collision course. In earlier work we have presented a ne...
Mark Blanchard, F. Claire Rind, Paul F. M. J. Vers...
136
Voted
MONET
2010
148views more  MONET 2010»
15 years 1 months ago
REP: Location Privacy for VANETs Using Random Encryption Periods
It is well recognized that security is vital for reliable operation of vehicular ad-hoc networks (VANETs). Location privacy is one of the main security challenges in VANETs, which ...
Albert Wasef, Xuemin (Sherman) Shen
VEE
2012
ACM
218views Virtualization» more  VEE 2012»
13 years 11 months ago
Enhancing TCP throughput of highly available virtual machines via speculative communication
Checkpoint-recovery based virtual machine (VM) replication is an attractive technique for accommodating VM installations with high-availability. It provides seamless failover for ...
Balazs Gerofi, Yutaka Ishikawa
P2P
2008
IEEE
15 years 10 months ago
Designs and Evaluation of a Tracker in P2P Networks
The ”tracker” of a P2P system is used to lookup which peers hold (or partially hold) a given object. There are various designs for the tracker function, from a single-server t...
Adele Lu Jia, Dah-Ming Chiu