Sciweavers

1674 search results - page 300 / 335
» On the Optimality of the ARQ-DDF Protocol
Sort
View
ICMCS
2009
IEEE
98views Multimedia» more  ICMCS 2009»
13 years 6 months ago
Scalability of HTTP pacing with intelligent bursting
While streaming protocols like RTSP/RTP have continued to evolved, HTTP has remained a primary method for Web-based video retrieval. The ubiquity and simplicity of HTTP makes it a...
Kevin J. Ma, Radim Bartos, Swapnil Bhatia
ASIACRYPT
2010
Springer
13 years 6 months ago
The Round Complexity of Verifiable Secret Sharing: The Statistical Case
We consider the round complexity of a basic cryptographic task: verifiable secret sharing (VSS). This well-studied primitive provides a good "test case" for our understan...
Ranjit Kumaresan, Arpita Patra, C. Pandu Rangan
ISF
2010
164views more  ISF 2010»
13 years 6 months ago
An SVM-based machine learning method for accurate internet traffic classification
Accurate and timely traffic classification is critical in network security monitoring and traffic engineering. Traditional methods based on port numbers and protocols have proven t...
Ruixi Yuan, Zhu Li, Xiaohong Guan, Li Xu
TDSC
2010
160views more  TDSC 2010»
13 years 3 months ago
Dual-Quorum: A Highly Available and Consistent Replication System for Edge Services
This paper introduces dual-quorum replication, a novel data replication algorithm designed to support Internet edge services. Edge services allow clients to access Internet service...
Lei Gao, Michael Dahlin, Jiandan Zheng, Lorenzo Al...
INFOCOM
2011
IEEE
13 years 16 days ago
Networking low-power energy harvesting devices: Measurements and algorithms
—Recent advances in energy harvesting materials and ultra-low-power communications will soon enable the realization of networks composed of energy harvesting devices. These devic...
Maria Gorlatova, Aya Wallwater, Gil Zussman