— While earlier studies have pointed out that short-lived TCP flows (mice) may hurt long-lived TCP flows (elephants) in the long term, they provide insufficient insight for devel...
S. Ebrahimi-Taghizadeh, Ahmed Helmy, Sandeep K. S....
—Most existing multiview video coding (MVC) techniques are based on the traditional hybrid DCT-based video coding schemes, e.g., MPEG-2, MPEG-4 and H.264. They neither fully expl...
Wenxian Yang, Feng Wu, Yan Lu, Jianfei Cai, King N...
—We propose an adaptive hybrid automatic repeat request–forward error correction (ARQ–FEC) erasure-correcting scheme for quality of service (QoS)-driven mobile multicast serv...
Recently, the Network-Attached Secure Disk (NASD) model has become a more widely used technique for constructing large-scale storage systems. However, the security system proposed...
We compare two algorithms for sorting out-of-core data on a distributed-memory cluster. One algorithm, Csort, is a 3-pass oblivious algorithm. The other, Dsort, makes three passes...