Sciweavers

8719 search results - page 1541 / 1744
» A Categorical Approach to Simulations
Sort
View
INFOCOM
2010
IEEE
14 years 12 months ago
MIS: Malicious Nodes Identification Scheme in Network-Coding-Based Peer-to-Peer Streaming
Network coding has been shown to be capable of greatly improving quality of service in P2P live streaming systems (e.g., IPTV). However, network coding is vulnerable to pollution a...
Qiyan Wang, Long Vu, Klara Nahrstedt, Himanshu Khu...
INFOCOM
2010
IEEE
14 years 12 months ago
Routing in Socially Selfish Delay Tolerant Networks
Abstract--Existing routing algorithms for Delay Tolerant Networks (DTNs) assume that nodes are willing to forward packets for others. In the real world, however, most people are so...
Qinghua Li, Sencun Zhu, Guohong Cao
INFOCOM
2010
IEEE
14 years 12 months ago
Scheduling Heterogeneous Real-Time Traffic over Fading Wireless Channels
We develop a general approach for designing scheduling policies for real-time traffic over wireless channels. We extend prior work, which characterizes a real-time flow by its traf...
I-Hong Hou, P. R. Kumar
IPPS
2010
IEEE
14 years 12 months ago
Large-scale multi-dimensional document clustering on GPU clusters
Document clustering plays an important role in data mining systems. Recently, a flocking-based document clustering algorithm has been proposed to solve the problem through simulat...
Yongpeng Zhang, Frank Mueller, Xiaohui Cui, Thomas...
MASS
2010
157views Communications» more  MASS 2010»
14 years 12 months ago
Spatial extension of the Reality Mining Dataset
Data captured from a live cellular network with the real users during their common daily routine help to understand how the users move within the network. Unlike the simulations wi...
Michal Ficek, Lukas Kencl
« Prev « First page 1541 / 1744 Last » Next »