Sciweavers

1568 search results - page 230 / 314
» On a network creation game
Sort
View
SP
2008
IEEE
103views Security Privacy» more  SP 2008»
14 years 4 months ago
Preserving Caller Anonymity in Voice-over-IP Networks
— Applications such as VoIP need to provide anonymity to clients while maintaining low latency to satisfy quality of service (QoS) requirements. Existing solutions for providing ...
Mudhakar Srivatsa, Ling Liu, Arun Iyengar
ICASSP
2010
IEEE
13 years 10 months ago
An auction-based framework for multimedia streaming over cognitive radio networks
Recently, many works have been proposed in the area of cognitive radio to efficiently utilize the spectrum for data communication. However, little effort has been made in content...
Yan Chen, Yongle Wu, Beibei Wang, K. J. Ray Liu
ICDCS
2012
IEEE
12 years 13 days ago
DARD: Distributed Adaptive Routing for Datacenter Networks
Datacenter networks typically have many paths connecting each host pair to achieve high bisection bandwidth for arbitrary communication patterns. Fully utilizing the bisection ban...
Xin Wu, Xiaowei Yang
CVPR
2006
IEEE
15 years 1 days ago
Multi-Target Tracking - Linking Identities using Bayesian Network Inference
Multi-target tracking requires locating the targets and labeling their identities. The latter is a challenge when many targets, with indistinct appearances, frequently occlude one...
Peter Nillius, Josephine Sullivan, Stefan Carlsson
INFOCOM
2009
IEEE
14 years 4 months ago
Analysis of Adaptive Incentive Protocols for P2P Networks
— Incentive protocols play a crucial role to encourage cooperation among nodes in networking applications. The aim of this paper is to provide a general analytical framework to a...
Ben Q. Zhao, John C. S. Lui, Dah-Ming Chiu