Sciweavers

1172 search results - page 29 / 235
» MIPv6 experimental evaluation using overlay networks
Sort
View
ICMCS
2006
IEEE
141views Multimedia» more  ICMCS 2006»
14 years 1 months ago
Ripple-Stream: Safeguarding P2P Streaming Against Dos Attacks
— Compared with file-sharing and distributed hash table (DHT) network, P2P streaming is more vulnerable to denial of service (DoS) attacks because of its high bandwidth demand a...
Wenjie Wang, Yongqiang Xiong, Qian Zhang, Sugih Ja...
GLOBECOM
2006
IEEE
14 years 1 months ago
QoS-aware Object Replication in Overlay Networks
Abstract— Many emerging applications for peer to peer overlays may require nodes to satisfy strict timing deadlines to access a replica of a given object. This includes multimedi...
Won Jong Jeon, Indranil Gupta, Klara Nahrstedt
WCW
2004
Springer
14 years 1 months ago
On the Equivalence of Forward and Reverse Query Caching in Peer-to-Peer Overlay Networks
Peer-to-peer systems such as Gnutella and Kazaa are used by millions of people for sharing music and many other files over the Internet, and they account for a significant portio...
Ali Raza Butt, Nipoon Malhotra, Sunil Patro, Y. Ch...
INFOCOM
2006
IEEE
14 years 1 months ago
Eclipse Attacks on Overlay Networks: Threats and Defenses
Abstract— Overlay networks are widely used to deploy functionality at edge nodes without changing network routers. Each node in an overlay network maintains connections with a nu...
Atul Singh, Tsuen-Wan Ngan, Peter Druschel, Dan S....
EUSFLAT
2009
141views Fuzzy Logic» more  EUSFLAT 2009»
13 years 5 months ago
An Experimental Study on the Interpretability of Fuzzy Systems
Abstract-- Interpretability is one of the most significant properties of Fuzzy Systems which are widely acknowledged as gray boxes against other Soft Computing techniques such as N...
José M. Alonso, Luis Magdalena