Sciweavers

2484 search results - page 398 / 497
» Polymatroids with Network Coding
Sort
View
DSN
2008
IEEE
14 years 2 months ago
AGIS: Towards automatic generation of infection signatures
An important yet largely uncharted problem in malware defense is how to automate generation of infection signatures for detecting compromised systems, i.e., signatures that charac...
Zhuowei Li, XiaoFeng Wang, Zhenkai Liang, Michael ...
DSN
2008
IEEE
14 years 2 months ago
Analyzing the effects of disk-pointer corruption
The long-term availability of data stored in a file system depends on how well it safeguards on-disk pointers used to access the data. Ideally, a system would correct all pointer...
Lakshmi N. Bairavasundaram, Meenali Rungta, Nitin ...
ICC
2008
IEEE
118views Communications» more  ICC 2008»
14 years 2 months ago
Video TFRC
— TCP-friendly rate control (TFRC) is a congestion control technique that trade-offs responsiveness to the network conditions for a smoother throughput variation. We take advanta...
Evan Tan, Jing Chen, Sebastien Ardon, Emmanuel Loc...
ICC
2008
IEEE
203views Communications» more  ICC 2008»
14 years 2 months ago
Spectrum Leasing via Distributed Cooperation in Cognitive Radio
Abstract— The concept of cognitive radio (or secondary spectrum access) is currently under investigation as a promising paradigm to achieve efficient use of the frequency resour...
Igor Stanojev, Osvaldo Simeone, Yeheskel Bar-Ness,...
ICDCS
2008
IEEE
14 years 2 months ago
Circumventing Server Bottlenecks: Indirect Large-Scale P2P Data Collection
In most large-scale peer-to-peer (P2P) applications, it is necessary to collect vital statistics data — sometimes referred to as logs — from up to millions of peers. Tradition...
Di Niu, Baochun Li