Sciweavers

331 search results - page 63 / 67
» Layered Multicast Recovery
Sort
View
DSN
2011
IEEE
12 years 7 months ago
Coercing clients into facilitating failover for object delivery
Abstract—Application-level protocols used for object delivery, such as HTTP, are built atop TCP/IP and inherit its hostabstraction. Given that these services are replicated for s...
Wyatt Lloyd, Michael J. Freedman
IACR
2011
104views more  IACR 2011»
12 years 7 months ago
Linear Cryptanalysis of PRINTcipher - Trails and Samples Everywhere
PRINTcipher is a recent lightweight block cipher designed by Knudsen et al. Some noteworthy characteristics are a burnt-in key, a key-dependent permutation layer and identical roun...
Martin Ågren, Thomas Johansson
COMCOM
2008
80views more  COMCOM 2008»
13 years 7 months ago
Robust video-on-demand streaming in peer-to-peer environments
This paper presents a new video-on-demand streaming technique in peer-to-peer (P2P) environments. While a number of P2P live video streaming techniques have been proposed in the p...
Tai T. Do, Kien A. Hua, Mounir A. Tantaoui
TPDS
2008
105views more  TPDS 2008»
13 years 7 months ago
peerTalk: A Peer-to-Peer Multiparty Voice-over-IP System
Multiparty voice-over-IP (MVoIP) services allow a group of people to freely communicate with each other via the Internet, which have many important applications such as online gami...
Xiaohui Gu, Zhen Wen, Philip S. Yu, Zon-Yin Shae
BMCBI
2005
134views more  BMCBI 2005»
13 years 7 months ago
Windows .NET Network Distributed Basic Local Alignment Search Toolkit (W.ND-BLAST)
Background: BLAST is one of the most common and useful tools for Genetic Research. This paper describes a software application we have termed Windows .NET Distributed Basic Local ...
Scot E. Dowd, Joaquin Zaragoza, Javier R. Rodrigue...