Sciweavers

2007 search results - page 60 / 402
» MUC-3 evaluation metrics
Sort
View
SUTC
2006
IEEE
14 years 2 months ago
An Authentication Service Based on Trust and Clustering in Wireless Ad Hoc Networks: Description and Security Evaluation
Security in wireless ad hoc networks is hard to achieve due to the vulnerability of its links, limited physical protection, and the absence of a centralized management point. Cons...
Edith C. H. Ngai, Michael R. Lyu
ICPADS
2002
IEEE
14 years 1 months ago
Evaluating and Improving Performance of Multimedia Applications on Simultaneous Multi-Threading
This paper presents the study and results of running several core multimedia applications on a simultaneous multithreading (SMT) architecture, including some detailed analysis ran...
Yen-Kuang Chen, Eric Debes, Rainer Lienhart, Matth...
HPDC
2009
IEEE
13 years 6 months ago
Evaluating the utility of content delivery networks
Content Delivery Networks (CDNs) balance costs and quality in services related to content delivery. This has urged many Web entrepreneurs to make contracts with CDNs. In the liter...
Konstantinos Stamos, George Pallis, Athena Vakali,...
ICMCS
2008
IEEE
158views Multimedia» more  ICMCS 2008»
14 years 3 months ago
Video quality assessment and comparative evaluation of peer-to-peer video streaming systems
We design a test methodology to analyze in detail the video quality received at each peer in a peer-to-peer (P2P) video streaming system. The metrics that we employ at each peer i...
Aditya Mavlankar, Pierpaolo Baccichet, Bernd Girod...
PE
2002
Springer
132views Optimization» more  PE 2002»
13 years 8 months ago
Performance evaluation with temporal rewards
Today many formalisms exist for specifying complex Markov chains. In contrast, formalisms for specifying rewards, enabling the analysis of long-run average performance properties,...
Jeroen Voeten