Sciweavers

448 search results - page 90 / 90
» k-anonymous message transmission
Sort
View
WICOMM
2010
143views more  WICOMM 2010»
13 years 5 months ago
Routing for cognitive radio networks consisting of opportunistic links
Cognitive radio (CR) has been considered a key technology to enhance overall spectrum utilization by opportunistic transmissions in CR transmitter-receiver link(s). However, CRs m...
Kwang-Cheng Chen, Bilge Kartal Cetin, Yu-Cheng Pen...
GLOBECOM
2010
IEEE
13 years 5 months ago
Efficient Uplink Bandwidth Utilization in P2P-TV Streaming Systems
Peer-to-Peer streaming systems (or P2P-TV) have been studied in the literature for some time, and they are becoming popular among users as well. P2P-TV systems target the real time...
Alessandra Carta, Marco Mellia, Michela Meo, Stefa...
VEE
2012
ACM
218views Virtualization» more  VEE 2012»
12 years 2 months ago
Enhancing TCP throughput of highly available virtual machines via speculative communication
Checkpoint-recovery based virtual machine (VM) replication is an attractive technique for accommodating VM installations with high-availability. It provides seamless failover for ...
Balazs Gerofi, Yutaka Ishikawa