Sciweavers

395 search results - page 7 / 79
» Metrics for the Evaluation of Multicast Communications
Sort
View
AUTONOMICS
2008
ACM
13 years 9 months ago
Building multicast trees in ad-hoc networks
Multicast trees are used in a variety of applications, such as publish/subscribe systems or content distribution networks. Existing algorithms for ad-hoc networks typically produc...
Raphaël Kummer, Peter G. Kropf, Pascal Felber
ACL
2001
13 years 9 months ago
Quantitative and Qualitative Evaluation of Darpa Communicator Spoken Dialogue Systems
This paper describes the application of the PARADISE evaluation framework to the corpus of 662 human-computer dialogues collected in the June 2000 Darpa Communicator data collecti...
Marilyn A. Walker, Rebecca J. Passonneau, Julie E....
INFOCOM
2005
IEEE
14 years 1 months ago
A comparative study of multicast protocols: top, bottom, or in the middle?
— Multicast solutions have been evolving from “bottom” to “top”, i.e., from IP layer (called IP multicast) to application layer (referred to as application layer multicas...
Li Lao, Jun-Hong Cui, Mario Gerla, Dario Maggiorin...
INFOCOM
1999
IEEE
14 years 5 hour ago
Bandwidth Allocation Policies for Unicast and Multicast Flows
Abstract--Using multicast delivery to multiple receivers reduces the aggregate bandwidth required from the network compared to using unicast delivery to each receiver. However mult...
Arnaud Legout, Jörg Nonnenmacher, Ernst Biers...
CSREASAM
2006
13 years 9 months ago
A New Approach For Source Authentication Of Multicast Data
Multicast Security is one of the important problems to solve for the successful deployment of group communication applications, and source authentication of multicast data is a key...
Jinxin He, Gaochao Xu, Zhiguo Zhou, Guannan Gong