Sciweavers

11112 search results - page 1871 / 2223
» Computing Stuttering Simulations
Sort
View
MOBIQUITOUS
2005
IEEE
15 years 10 months ago
Defend Against Cache Consistency Attacks in Wireless Ad Hoc Networks
Caching techniques can be used to reduce bandwidth consumption and data access delay in wireless ad hoc networks. When cache is used, cache consistency issues must be addressed. T...
Wensheng Zhang, Guohong Cao
P2P
2005
IEEE
15 years 10 months ago
Video Management in Peer-to-Peer Systems
Providing scalable video services in a peer-to-peer (P2P) environment is challenging. Since videos are typically large and require high communication bandwidth for delivery, many ...
Ying Cai, Zhan Chen, Wallapak Tavanapong
143
Voted
P2P
2005
IEEE
104views Communications» more  P2P 2005»
15 years 10 months ago
Range Queries in Trie-Structured Overlays
Among the open problems in P2P systems, support for non-trivial search predicates, standardized query languages, distributed query processing, query load balancing, and quality of...
Anwitaman Datta, Manfred Hauswirth, Renault John, ...
P2P
2005
IEEE
119views Communications» more  P2P 2005»
15 years 10 months ago
Search with Probabilistic Guarantees in Unstructured Peer-to-Peer Networks
Search is a fundamental service in peer-to-peer (P2P) networks. However, despite numerous research efforts, efficient algorithms for guaranteed location of shared content in unst...
Ronaldo A. Ferreira, Murali Krishna Ramanathan, As...
145
Voted
P2P
2005
IEEE
112views Communications» more  P2P 2005»
15 years 10 months ago
Randomized Protocols for Duplicate Elimination in Peer-to-Peer Storage Systems
Distributed peer-to-peer systems rely on voluntary participation of peers to effectively manage a storage pool. In such systems, data is generally replicated for performance and a...
Ronaldo A. Ferreira, Murali Krishna Ramanathan, An...
« Prev « First page 1871 / 2223 Last » Next »