Sciweavers

166 search results - page 33 / 34
» On the Feasibility of Bandwidth Detouring
Sort
View
CCR
2004
90views more  CCR 2004»
13 years 5 months ago
A constraint satisfaction approach to testbed embedding services
Today's networking community is becoming increasingly skeptical of the significance of research results founded wholly upon experimental results conducted in simulation. Now, ...
Jeffrey Considine, John W. Byers, Ketan Meyer-Pate...
KAIS
2000
139views more  KAIS 2000»
13 years 5 months ago
Incremental View Maintenance for Mobile Databases
In a mobile environment, querying a database at a stationary server from a mobile client is expensive due to the limited bandwidth of a wireless channel and the instability of the ...
Ken C. K. Lee, Hong Va Leong, Antonio Si
ITIIS
2010
137views more  ITIIS 2010»
13 years 4 months ago
Improving the Availability of Scalable on-demand Streams by Dynamic Buffering on P2P Networks
In peer-to-peer (P2P) on-demand streaming networks, the alleviation of server load depends on reciprocal stream sharing among peers. In general, on-demand video services enable cl...
Chow-Sing Lin
SP
2010
IEEE
176views Security Privacy» more  SP 2010»
13 years 3 months ago
Investigation of Triangular Spamming: A Stealthy and Efficient Spamming Technique
Spam is increasingly accepted as a problem associated with compromised hosts or email accounts. This problem not only makes the tracking of spam sources difficult but also enables ...
Zhiyun Qian, Zhuoqing Morley Mao, Yinglian Xie, Fa...
CN
2010
130views more  CN 2010»
13 years 3 months ago
CoreCast: How core/edge separation can help improving inter-domain live streaming
The rapid growth of broadband access has popularized multimedia services, which nowadays contribute to a large part of Internet traffic. Among this content, the broadcasting of li...
Loránd Jakab, Albert Cabellos-Aparicio, Tho...