Sciweavers

15251 search results - page 2768 / 3051
» Network Science - Theory and Application
Sort
View
ICASSP
2009
IEEE
15 years 11 months ago
Delay-based overlay construction in P2P video broadcast
We consider streaming video content over an overlay network of peer nodes. Each of the nodes employs a mesh-pull mechanism to organize the download of data units from its neighbou...
Jacob Chakareski, Pascal Frossard
ICC
2009
IEEE
118views Communications» more  ICC 2009»
15 years 11 months ago
A First Order Logic Security Verification Model for SIP
: It is well known that no security mechanism can provide full protection against a potential attack. There is always a possibility that a security incident may happen, mainly as a...
Dimitris Geneiatakis, Costas Lambrinoudakis, Georg...
ICC
2009
IEEE
159views Communications» more  ICC 2009»
15 years 11 months ago
Evidences Behind Skype Outage
—Skype is one of the most successful VoIP application in the current Internet spectrum. One of the most peculiar characteristics of Skype is that it relies on a P2P infrastructur...
Dario Rossi, Marco Mellia, Michela Meo
RTAS
2009
IEEE
15 years 11 months ago
Execution Strategies for PTIDES, a Programming Model for Distributed Embedded Systems
—We define a family of execution policies for a programming model called PTIDES (Programming Temporally Integrated Distributed Embedded Systems). A PTIDES application (factory a...
Jia Zou, Slobodan Matic, Edward A. Lee, Thomas Hui...
ICDIM
2009
IEEE
15 years 11 months ago
Augmenting the exploration of digital libraries with web-based visualizations
Web-based digital libraries have sped up the process that scholars use to find new, important research papers. Unfortunately, current digital libraries are limited by their inade...
Peter Bergstrom, Darren C. Atkinson
« Prev « First page 2768 / 3051 Last » Next »