Sciweavers

5707 search results - page 1122 / 1142
» Symbolic Simulation - Techniques and Applications
Sort
View
TPDS
2008
105views more  TPDS 2008»
13 years 9 months ago
peerTalk: A Peer-to-Peer Multiparty Voice-over-IP System
Multiparty voice-over-IP (MVoIP) services allow a group of people to freely communicate with each other via the Internet, which have many important applications such as online gami...
Xiaohui Gu, Zhen Wen, Philip S. Yu, Zon-Yin Shae
TPDS
2008
116views more  TPDS 2008»
13 years 9 months ago
Pseudo Trust: Zero-Knowledge Authentication in Anonymous P2Ps
Most trust models in Peer-to-Peer (P2P) systems are identity based, which means that in order for one peer to trust another, it needs to know the other peer's identity. Hence,...
Li Lu, Jinsong Han, Yunhao Liu, Lei Hu, Jinpeng Hu...
JSAC
2007
177views more  JSAC 2007»
13 years 9 months ago
Achieving Shared Protection for Dynamic Multicast Sessions in Survivable Mesh WDM Networks
— The advances in wavelength-division multiplexing (WDM) technology are expected to facilitate bandwidth-intensive multicast applications. A single fiber failure in such a netwo...
Hongbin Luo, Lemin Li, Hongfang Yu, Sheng Wang
JSAC
2007
180views more  JSAC 2007»
13 years 9 months ago
A Cross-Layer Approach for WLAN Voice Capacity Planning
— This paper presents an analytical approach to determining the maximum number of on/off voice flows that can be supported over a wireless local area network (WLAN), under a qua...
Yu Cheng, Xinhua Ling, Wei Song, Lin X. Cai, Weihu...
TWC
2008
140views more  TWC 2008»
13 years 9 months ago
Exclusive-Region Based Scheduling Algorithms for UWB WPAN
With the capability of supporting very high data rate services in a short range, Ultra-Wideband (UWB) technology is appealing to multimedia applications in future wireless personal...
Kuang-Hao Liu, Lin Cai, Xuemin Shen
« Prev « First page 1122 / 1142 Last » Next »