Sciweavers

1250 search results - page 144 / 250
» Membership-concealing overlay networks
Sort
View
INFOCOM
2010
IEEE
13 years 8 months ago
MIS: Malicious Nodes Identification Scheme in Network-Coding-Based Peer-to-Peer Streaming
Network coding has been shown to be capable of greatly improving quality of service in P2P live streaming systems (e.g., IPTV). However, network coding is vulnerable to pollution a...
Qiyan Wang, Long Vu, Klara Nahrstedt, Himanshu Khu...
ACSW
2006
14 years 1 days ago
Simulating a computational grid with networked animat agents
Computational grids are now widespread, but their large-scale behaviour is still poorly understood. We report on some calculations of loading, scaling and utilisation behaviours o...
Kenneth A. Hawick, Heath A. James
JSS
2006
155views more  JSS 2006»
13 years 10 months ago
Semantic component networking: Toward the synergy of static reuse and dynamic clustering of resources in the knowledge grid
Model is a kind of codified knowledge that has been verified in solving problems. Solving a complex problem usually needs a set of models. Using components, the composition of a s...
Hai Zhuge
ICUMT
2009
13 years 8 months ago
Experimental study on neighbor selection policy for Phoenix Network Coordinate system
Network Coordinate (NC) which provides efficient distance prediction with scalable measurements, brings benefits to various network applications. Phoenix Network Coordinate system ...
Gang Wang, Shining Wu, Guodong Wang, Beixing Deng,...
IMC
2007
ACM
14 years 5 days ago
Towards network triangle inequality violation aware distributed systems
Many distributed systems rely on neighbor selection mechanisms to create overlay structures that have good network performance. These neighbor selection mechanisms often assume th...
Guohui Wang, Bo Zhang, T. S. Eugene Ng