Sciweavers

11588 search results - page 2259 / 2318
» Will They Like This
Sort
View
TON
2010
93views more  TON 2010»
13 years 7 months ago
On suitability of Euclidean embedding for host-based network coordinate systems
Abstract—In this paper, we investigate the suitability of embedding Internet hosts into a Euclidean space given their pairwise distances (as measured by round-trip time). Using t...
Sanghwan Lee, Zhi-Li Zhang, Sambit Sahu, Debanjan ...
TON
2010
163views more  TON 2010»
13 years 7 months ago
Toward practical opportunistic routing with intra-session network coding for mesh networks
—We consider opportunistic routing in wireless mesh networks. We exploit the inherent diversity of the broadcast nature of wireless by making use of multi-path routing. We presen...
Bozidar Radunovic, Christos Gkantsidis, Peter B. K...
TPDS
2010
118views more  TPDS 2010»
13 years 7 months ago
Using Parallel Bloom Filters for Multiattribute Representation on Network Services
—One widely used mechanism for representing membership of a set of items is the simple space-efficient randomized data structure known as Bloom filters. Yet, Bloom filters are no...
Bin Xiao, Yu Hua
TPDS
2010
115views more  TPDS 2010»
13 years 7 months ago
Providing QoS with the Deficit Table Scheduler
—A key component for networks with Quality of Service (QoS) support is the egress link scheduling algorithm. An ideal scheduling algorithm implemented in a high-performance netwo...
Raul Martinez-Morais, Francisco J. Alfaro-Cortes, ...
VIROLOGY
2010
179views more  VIROLOGY 2010»
13 years 7 months ago
Automatic binary deobfuscation
Abstract. This paper gives an overview of our research in the automation of the process of software protection analysis. We will focus more particularly on the problem of obfuscati...
Yoann Guillot, Alexandre Gazet
« Prev « First page 2259 / 2318 Last » Next »