Sciweavers

3657 search results - page 569 / 732
» A Study of Practical Deduplication
Sort
View
TON
2008
76views more  TON 2008»
14 years 10 months ago
Minimizing file download time in stochastic peer-to-peer networks
The peer-to-peer (P2P) file-sharing applications are becoming increasingly popular and account for more than 70% of the Internet's bandwidth usage. Measurement studies show th...
Yuh-Ming Chiu, Do Young Eun
87
Voted
TPDS
2008
136views more  TPDS 2008»
14 years 10 months ago
Data Gathering with Tunable Compression in Sensor Networks
We study the problem of constructing a data gathering tree over a wireless sensor network in order to minimize the total energy for compressing and transporting information from a ...
Yang Yu, Bhaskar Krishnamachari, Viktor K. Prasann...
TPDS
2008
72views more  TPDS 2008»
14 years 10 months ago
Replica Placement and Access Policies in Tree Networks
In this paper, we discuss and compare several policies to place replicas in tree networks, subject to server capacity and Quality of Service (QoS) constraints. The client requests ...
Anne Benoit, Veronika Rehn-Sonigo, Yves Robert
90
Voted
JMIV
2007
156views more  JMIV 2007»
14 years 10 months ago
Using the Shape Gradient for Active Contour Segmentation: from the Continuous to the Discrete Formulation
A variational approach to image or video segmentation consists in defining an energy depending on local or global image characteristics, the minimum of which being reached for ob...
Eric Debreuve, Muriel Gastaud, Michel Barlaud, Gil...
JMM
2007
107views more  JMM 2007»
14 years 10 months ago
Using a Spatial Context Authentication Proxy for Establishing Secure Wireless Connections
Spontaneous interaction in wireless ad-hoc networks is often desirable not only between users or devices in direct contact, but also with devices that are accessible only via a wi...
Rene Mayrhofer, Roswitha Gostner