Sciweavers

3082 search results - page 106 / 617
» its 2004
Sort
View
MM
2004
ACM
107views Multimedia» more  MM 2004»
14 years 2 months ago
Collusion attack on a multi-key secure video proxy scheme
In ACM Multimedia’2002, a video proxy scheme was proposed for secure video delivery. In the scheme, a video is cached in proxies in encrypted form so that it remains nondisclose...
Yongdong Wu, Feng Bao
PPPJ
2004
ACM
14 years 2 months ago
A low-footprint class loading mechanism for embedded Java virtual machines
This paper shows that it is possible to dramatically reduce the memory consumption of classes loaded in an embedded Java virtual machine without reducing its functionalities. We d...
Christophe Rippert, Alexandre Courbot, Gilles Grim...
SIGCOMM
2004
ACM
14 years 2 months ago
Modeling and performance analysis of BitTorrent-like peer-to-peer networks
In this paper, we develop simple models to study the performance of BitTorrent, a second generation peer-to-peer (P2P) application. We first present a simple fluid model and stu...
Dongyu Qiu, Rayadurgam Srikant
ADVIS
2004
Springer
14 years 2 months ago
Integrating Distributed Composite Objects into Java Environment
This paper introduces a new programming model for distributed systems, distributed composite objects (DCO), to meet efficient implementation, transparency, and performance demands ...
Guray Yilmaz, Nadia Erdogan
AH
2004
Springer
14 years 2 months ago
A P2P Distributed Adaptive Directory
We describe a P2P system that offers a distributed, cooperative and adaptive environment for bookmark sharing. DAD offers an adaptive environment since it provides suggestions abou...
Gennaro Cordasco, Vittorio Scarano, Cristiano Vito...