Sciweavers

AP2PS
2009
IEEE
13 years 12 months ago
Algorithm-Based Fault Tolerance Applied to P2P Computing Networks
—P2P computing platforms are subject to a wide range of attacks. In this paper, we propose a generalisation of the previous disk-less checkpointing approach for fault-tolerance i...
Thomas Roche, Mathieu Cunche, Jean-Louis Roch
AP2PS
2009
IEEE
13 years 12 months ago
Environmental Security in P2P Networks
Jesús E. Díaz-Verdejo, Pedro Garcia-...
AINA
2010
IEEE
13 years 12 months ago
Applying TCP-Friendly Congestion Control to Concurrent Multipath Transfer
Abstract--The steadily growing importance of Internetbased applications and their resilience requirements lead to a rising number of multi-homed sites. The idea of Concurrent Multi...
Thomas Dreibholz, Martin Becke, Jobin Pulinthanath...
AINA
2010
IEEE
13 years 12 months ago
YASA-M: A Semantic Web Service Matchmaker
Abstract--In this paper, we present new algorithms for matching Web services described in YASA4WSDL (YASA for short). We have already defined YASA that overcomes some issues missin...
Yassin Chabeb, Samir Tata, Alain Ozanne
NOSSDAV
2010
Springer
14 years 1 days ago
Randomised pair comparison: an economic and robust method for audiovisual quality assessment
Subjective quality perception studies with human observers are essential for multimedia system design. Such studies are known to be expensive and difficult to administer. They req...
Alexander Eichhorn, Pengpeng Ni, Ragnhild Eg
AINA
2009
IEEE
14 years 2 days ago
A Content-Oriented Framework for Online Discussion Analysis
Anna Stavrianou, Jean-Hugues Chauchat, Julien Velc...
AINA
2010
IEEE
14 years 2 days ago
PRoPHET+: An Adaptive PRoPHET-Based Routing Protocol for Opportunistic Network
Abstract—We propose PRoPHET+, a routing scheme for opportunistic networks designed to maximize successful data delivery rate and minimize transmission delay. PRoPHET+ computes a ...
Ting-Kai Huang, Chia-Keng Lee, Ling-Jyh Chen
AINA
2010
IEEE
14 years 2 days ago
Mnesic Evocation: An Isochron-Based Analysis
—Mnesic evocation occurs under the action of a stimulus. A successful evocation is observed as the overrun of a certain threshold of the neuronal activity followed by a medical i...
Hedi Ben Amor, Jacques Demongeot, Nicolas Glade
AINA
2010
IEEE
14 years 2 days ago
Detecting Suspicious Motion with Nonimaging Sensors
—Automated distributed sentry systems need only detect suspicious behavior. Microphones and infrared detectors may suffice, as well as being simpler and cheaper than cameras whil...
Neil C. Rowe, Ahren A. Reed, Jose J. Flores