Sciweavers

1266 search results - page 133 / 254
» Threat Evaluation Method for Distributed Network Environment
Sort
View
GCC
2005
Springer
15 years 9 months ago
RSM and SLN: Transformation, Normalization and Cooperation
The Resource Space Model RSM and Semantic Link Network SLN are models of future interconnection environment, and the combination of them forms a rich semantic layer for the next-ge...
Erlin Yao, Yunpeng Xing, Jie Liu, Xiaoping Sun
SIGCOMM
2006
ACM
15 years 10 months ago
Enabling contribution awareness in an overlay broadcasting system
We consider the design of bandwidth-demanding broadcasting applications using overlays in environments characterized by hosts with limited and asymmetric bandwidth, and significa...
Yu-Wei Eric Sung, Michael A. Bishop, Sanjay G. Rao
ICDCSW
2005
IEEE
15 years 10 months ago
Directional NAV Indicators and Orthogonal Routing for Smart Antenna Based Ad Hoc Networks
Smart antennas are expected to enhance scalability in ad hoc networks. This paper at first evaluates three directional MAC protocols, DMAC, MMAC and SWAMP as well as the omni-dir...
Masanori Sekido, Masanori Takata, Masaki Bandai, T...
ICC
2007
IEEE
120views Communications» more  ICC 2007»
15 years 10 months ago
A Peer-to-Peer Approach for Remote Rendering and Image Streaming in Walkthrough Applications
— Motivated by the widespread of file and video streaming over peer-to-peer networks, we propose to investigate the design of a peer-to-peer solution for image-based remote walk...
Azzedine Boukerche, Richard Werner Nelem Pazzi
ISPA
2005
Springer
15 years 9 months ago
A Generic Approach to Make Structured Peer-to-Peer Systems Topology-Aware
Abstract. With the help of distributed hash tables, the structured peerto-peer system has a short routing path and good extensibility. However, the mismatch between the overlay and...
Tongqing Qiu, Fan Wu, Guihai Chen