Sciweavers

1639 search results - page 243 / 328
» Degree-constrained network flows
Sort
View
109
Voted
WSC
2004
15 years 2 months ago
A BGP Attack Against Traffic Engineering
As the Internet grows, traffic engineering has become a widely-used technique to control the flow of packets. For the inter-domain routing, traffic engineering relies on configura...
Jintae Kim, Steven Y. Ko, David M. Nicol, Xenofont...
100
Voted
SIGCOMM
2010
ACM
15 years 27 days ago
Experimenting with multipath TCP
It is becoming the norm for small mobile devices to have access to multiple technologies for connecting to the Internet. This gives researchers an increasing interest for solution...
Sébastien Barré, Olivier Bonaventure...
91
Voted
WICOMM
2008
83views more  WICOMM 2008»
15 years 17 days ago
iPTT: peer-to-peer push-to-talk for VoIP
This paper proposes iPTT, a peer-to-peer Push-to-Talk (PTT) service for Voice over IP (VoIP). In iPTT, a distributed and mobile-operator independent network architecture is presen...
Jiun-Ren Lin, Ai-Chun Pang, Yung-Chi Wang
125
Voted
PE
2000
Springer
175views Optimization» more  PE 2000»
15 years 14 days ago
Credit-based source-adaptive multilayered video multicast
Spatial and temporal variations in network bandwidth constraints constitute serious challenges to the multicast distribution of real-time video content. This paper presents a vide...
Célio Albuquerque, Brett J. Vickers, Tatsuy...
115
Voted
ICIP
2003
IEEE
16 years 2 months ago
Compressed domain human motion recognition using motion history information
In this paper we present a system for classifying various human actions in compressed domain video framework. We introduce the notion of quantifying the motion involved, through w...
R. Venkatesh Babu, K. R. Ramakrishnan