Sciweavers

5324 search results - page 834 / 1065
» Internet Security Protocols
Sort
View
CORR
1999
Springer
67views Education» more  CORR 1999»
13 years 9 months ago
ZBroker: A Query Routing Broker for Z39.50 Databases
A query routing broker is a software agent that determines from a large set of accessing information sources the ones most relevant to a user's information need. As the numbe...
Yong Lin, Jian Xu, Ee-Peng Lim, Wee Keong Ng
MMS
2002
13 years 9 months ago
A proxy architecture for collaborative media streaming
Streaming media from the Internet is a successful application for end-users. With the upcoming success of mobile devices and home networking environments, cooperation among users ...
Verena Kahmann, Lars C. Wolf
PE
2002
Springer
124views Optimization» more  PE 2002»
13 years 9 months ago
Continuous-time hidden Markov models for network performance evaluation
In this paper, we study the use of continuous-time hidden Markov models (CT-HMMs) for network protocol and application performance evaluation. We develop an algorithm to infer the...
Wei Wei, Bing Wang, Donald F. Towsley
INFOCOM
2010
IEEE
13 years 8 months ago
Greedy Forwarding in Dynamic Scale-Free Networks Embedded in Hyperbolic Metric Spaces
In this paper we show that complex (scale-free) network topologies naturally emerge from hyperbolic metric spaces. The hyperbolic geometry can be used to facilitate maximally efï¬...
Fragkiskos Papadopoulos, Dmitri V. Krioukov, Mari&...
ISOLA
2010
Springer
13 years 8 months ago
Towards More Adaptive Voice Applications
With the Internet designed to provide best-effort packet transmission, applications are expected to adapt dynamically to the operating conditions observed in the network. For this ...
Jörg Ott