Sciweavers

776 search results - page 143 / 156
» A System Structure for Adaptive Mobile Applications
Sort
View
79
Voted
SADFE
2008
IEEE
15 years 4 months ago
Finding the Evidence in Tamper-Evident Logs
Secure logs are powerful tools for building systems that must resist forgery, prove temporal relationships, and stand up to forensic scrutiny. The proofs of order and integrity en...
Daniel Sandler, Kyle Derr, Scott A. Crosby, Dan S....
ICMCS
2009
IEEE
138views Multimedia» more  ICMCS 2009»
14 years 8 months ago
Multi-rate peer-to-peer video conferencing: A distributed approach using scalable coding
We consider multi-rate peer-to-peer multi-party conferencing applications, where different receivers in the same group can receive videos at different rates using, for example, sc...
Miroslav Ponec, Sudipta Sengupta, Minghua Chen, Ji...
111
Voted
HIPC
2003
Springer
15 years 3 months ago
POMA: Prioritized Overlay Multicast in Ad Hoc Environments
Abstract: Overlay Multicast networks in mobile ad-hoc environments have received much attention due to their increasing number of practical applications. Although overlay multicast...
Abhishek P. Patil, Yunhao Liu, Lionel M. Ni, Li Xi...
CORR
2004
Springer
180views Education» more  CORR 2004»
14 years 10 months ago
Self-Organized Stigmergic Document Maps: Environment as a Mechanism for Context Learning
Social insect societies and more specifically ant colonies, are distributed systems that, in spite of the simplicity of their individuals, present a highly structured social organi...
Vitorino Ramos, Juan J. Merelo Guervós
SOSP
2005
ACM
15 years 7 months ago
Implementing declarative overlays
Overlay networks are used today in a variety of distributed systems ranging from file-sharing and storage systems to communication infrastructures. However, designing, building a...
Boon Thau Loo, Tyson Condie, Joseph M. Hellerstein...