Sciweavers

11381 search results - page 2218 / 2277
» Connectivity
Sort
View
WINET
2002
144views more  WINET 2002»
15 years 5 days ago
Exposure in Wireless Sensor Networks: Theory and Practical Solutions
Wireless ad-hoc sensor networks have the potential to provide the missing interface between the physical world and the Internet, thus impacting a large number of users. This conne...
Seapahn Megerian, Farinaz Koushanfar, Gang Qu, Gia...
COMCOM
2008
135views more  COMCOM 2008»
15 years 4 days ago
Peer-to-peer system-based active worm attacks: Modeling, analysis and defense
Active worms continue to pose major threats to the security of today's Internet. This is due to the ability of active worms to automatically propagate themselves and compromi...
Wei Yu, Sriram Chellappan, Xun Wang, Dong Xuan
95
Voted
CORR
2010
Springer
123views Education» more  CORR 2010»
15 years 3 days ago
A Peer-to-Peer Middleware Framework for Resilient Persistent Programming
The persistent programming systems of the 1980s offered a programming model that integrated computation and long-term storage. In these systems, reliable applications could be eng...
Alan Dearle, Graham N. C. Kirby, Stuart J. Norcros...
97
Voted
CORR
2010
Springer
136views Education» more  CORR 2010»
15 years 3 days ago
Maximum Bipartite Matching Size And Application to Cuckoo Hashing
Cuckoo hashing with a stash is a robust high-performance hashing scheme that can be used in many real-life applications. It complements cuckoo hashing by adding a small stash stor...
Josef Kanizo, David Hay, Isaac Keslassy
91
Voted
MTA
2007
113views more  MTA 2007»
15 years 1 days ago
Throughput optimization for video streaming proxy servers based on video staging
A video streaming proxy server needs to handle hundreds of simultaneous connections between media servers and clients. Inside, every video arrived at the server and delivered from ...
Wai Kong Cheuk, Daniel Pak-Kong Lun
« Prev « First page 2218 / 2277 Last » Next »