Sciweavers

2699 search results - page 470 / 540
» On Evaluating the Performance of Security Protocols
Sort
View
DSN
2008
IEEE
14 years 2 months ago
Hot-spot prediction and alleviation in distributed stream processing applications
Many emerging distributed applications require the realtime processing of large amounts of data that are being updated continuously. Distributed stream processing systems offer a ...
Thomas Repantis, Vana Kalogeraki
ICMCS
2008
IEEE
206views Multimedia» more  ICMCS 2008»
14 years 2 months ago
Redundant motion vectors for improved error resilience in H.264/AVC coded video
This proposal presents a new error robust strategy for encoding redundant pictures for the H.264/AVC standard. The method is based on providing motion vectors as redundant data, i...
Maheshi B. Dissanayake, Chaminda T. E. R. Hewage, ...
INFOCOM
2008
IEEE
14 years 2 months ago
Searching for Rare Objects Using Index Replication
—Searching for objects is a fundamental problem for popular peer-to-peer file-sharing networks that contribute to much of the traffic on today’s Internet. While existing prot...
Krishna Puttaswamy, Alessandra Sala, Ben Y. Zhao
INFOCOM
2008
IEEE
14 years 2 months ago
AdapCode: Adaptive Network Coding for Code Updates in Wireless Sensor Networks
—Code updates, such as those for debugging purposes, are frequent and expensive in the early development stages of wireless sensor network applications. We propose AdapCode, a re...
I-Hong Hou, Yu-En Tsai, Tarek F. Abdelzaher, Indra...
IPPS
2008
IEEE
14 years 2 months ago
Absolute Slicing in Peer-to-peer Systems
Peer-to-peer (P2P) systems are slowly moving from application-specific architectures to a generic serviceoriented design framework. The idea is to allow a dynamic collection of P...
Alberto Montresor, Roberto Zandonati