Abstract— Many emerging applications for peer to peer overlays may require nodes to satisfy strict timing deadlines to access a replica of a given object. This includes multimedi...
— Multiple description coding (MDC) has emerged as a powerful technique for reliable real-time communications over lossy packet networks. In its basic form, it involves encoding ...
—This paper introduces a novel deployment time optimization technology for Internet services. Using the configuration information collected from the operation environment, the pr...
Sang Jeong Lee, Kang-Won Lee, Kyung Dong Ryu, Jong...
The seamless and flexible interconnection of the existing and emerging protocols and networks is essential to the success of the new generation mobile applications and services. Fo...
Erkki Harjula, Jussi Ala-Kurikka, Douglas Howie, M...
Flooding and random walk (RW) are the two typical search algorithms in unstructured peer-to-peer networks. The flooding algorithm searches the network aggressively. It covers the m...
The standardization of the IMS as a multi-access network implies that it can be accessed by different classes of terminals. Even at the heart of the same class of terminals (mobile...
—This report describes our ongoing work on a new end-to-end available-bandwidth measurement tool: FEAT (Fish-Eye Availablebandwidth Tool). FEAT features a new dynamic pattern of ...
- In the next generation Internet, the network should evolve from a plain communication medium into an endless source of services available to the end-systems. We name these servic...
— We study the problem of building an optimal network-layer clustering hierarchy, where the optimality can be defined using three potentially conflicting metrics: state, delay ...
Leonid B. Poutievski, Kenneth L. Calvert, Jim Grif...
— We propose a high-rate error-pattern control code based on a generator polynomial targeting a specific set of known dominant error patterns. This code is based on first const...