Sciweavers

7758 search results - page 1423 / 1552
» On the Number of Distributive Lattices
Sort
View
P2P
2008
IEEE
14 years 4 months ago
On the Impact of Greedy Strategies in BitTorrent Networks: The Case of BitTyrant
The success of BitTorrent has fostered the development of variants to its basic components. Some of the variants adopt greedy approaches aiming at exploiting the intrinsic altruis...
Damiano Carra, Giovanni Neglia, Pietro Michiardi
TRIDENTCOM
2008
IEEE
14 years 4 months ago
Performance of P2P live video streaming systems on a controlled test-bed
We evaluate and compare the performance of three P2P streaming systems that are capable of streaming live video on the Internet by testing them on a carefully controlled, traffic...
Sachin Agarwal, Jatinder Pal Singh, Aditya Mavlank...
ACSC
2007
IEEE
14 years 4 months ago
Conflict Management For Real-Time Collaborative Editing in Mobile Replicated Architectures
Mobile technology is particularly suited to a fully distributed (replicated) architecture for collaborative work. Users can maintain their own document copies, and can continue to...
Sandy Citro, Jim McGovern, Caspar Ryan
BROADNETS
2007
IEEE
14 years 4 months ago
Joint monitoring and routing in wireless sensor networks using robust identifying codes
Wireless Sensor Networks (WSNs) provide an important means of monitoring the physical world, but their ons present challenges to fundamental network services such as routing. In t...
Moshe Laifenfeld, Ari Trachtenberg, Reuven Cohen, ...
CLUSTER
2007
IEEE
14 years 4 months ago
Anomaly localization in large-scale clusters
— A critical problem facing by managing large-scale clusters is to identify the location of problems in a system in case of unusual events. As the scale of high performance compu...
Ziming Zheng, Yawei Li, Zhiling Lan
« Prev « First page 1423 / 1552 Last » Next »