Sciweavers

13214 search results - page 2565 / 2643
» Pseudorandomness for network algorithms
Sort
View
JSAC
2007
116views more  JSAC 2007»
15 years 4 months ago
Outreach: peer-to-peer topology construction towards minimized server bandwidth costs
Abstract— On-demand and live multimedia streaming applications (such as Internet TV) are well known to utilize a significant amount of bandwidth from media streaming servers, es...
Tara Small, Baochun Li, Ben Liang
TVCG
2008
122views more  TVCG 2008»
15 years 4 months ago
Interactive Entity Resolution in Relational Data: A Visual Analytic Tool and Its Evaluation
Databases often contain uncertain and imprecise references to real-world entities. Entity resolution, which is the process of reconciling multiple references to underlying real-wor...
Hyunmo Kang, Lise Getoor, Ben Shneiderman, Mustafa...
JSS
2007
121views more  JSS 2007»
15 years 4 months ago
SEAL: A secure communication library for building dynamic group key agreement applications
We present the SEcure communicAtion Library (SEAL), a Linux-based C language application programming interface (API) library that implements secure group key agreement algorithms ...
Patrick P. C. Lee, John C. S. Lui, David K. Y. Yau
TWC
2008
120views more  TWC 2008»
15 years 4 months ago
Binary Power Control for Sum Rate Maximization over Multiple Interfering Links
We consider allocating the transmit powers for a wireless multi-link (N-link) system, in order to maximize the total system throughput under interference and noise impairments, and...
Anders Gjendemsjø, David Gesbert, Geir E. &...
TWC
2008
141views more  TWC 2008»
15 years 4 months ago
Progressive Accumulative Routing: Fundamental Concepts and Protocol
This paper considers a multi-hop network in which relay nodes cooperate to minimize the total energy consumed in transmitting a (unicast) packet from a source to a destination. We...
Raymond Yim, Neelesh B. Mehta, Andreas F. Molisch,...
« Prev « First page 2565 / 2643 Last » Next »