Sciweavers

828 search results - page 106 / 166
» A Network Coding Approach to Secret Key Distribution
Sort
View
HASE
2008
IEEE
15 years 4 months ago
HyperMIP: Hypervisor Controlled Mobile IP for Virtual Machine Live Migration across Networks
Live migration provides transparent load-balancing and fault-tolerant mechanism for applications. When a Virtual Machine migrates among hosts residing in two networks, the network...
Qin Li, Jinpeng Huai, Jianxin Li, Tianyu Wo, Minxi...
SPAA
1996
ACM
15 years 7 months ago
Constant Time per Edge is Optimal on Rooted Tree Networks
We analyze the relationship between the expected packet delay in rooted tree networks and the distribution of time needed for a packet to cross an edge using convexity-based stoch...
Michael Mitzenmacher
AINA
2005
IEEE
15 years 8 months ago
Throughput Driven, Highly Available Streaming Stored Playback Video Service over a Peer-to-Peer Network
Streaming video is a key functionality in Internet based services such as distant education, VoD etc.,. The high bandwidth requirements associated with such applications coupled w...
K. Kalapriya, S. K. Nandy
CORR
2007
Springer
153views Education» more  CORR 2007»
15 years 3 months ago
Power-Bandwidth Tradeoff in Dense Multi-Antenna Relay Networks
— We consider a dense fading multi-user network with multiple active multi-antenna source-destination pair terminals communicating simultaneously through a large common set of K ...
Ozgur Oyman, Arogyaswami Paulraj
ICDCS
2010
IEEE
15 years 7 months ago
Sentomist: Unveiling Transient Sensor Network Bugs via Symptom Mining
—Wireless Sensor Network (WSN) applications are typically event-driven. While the source codes of these applications may look simple, they are executed with a complicated concurr...
Yangfan Zhou, Xinyu Chen, Michael R. Lyu, Jiangchu...