Sciweavers

220 search results - page 38 / 44
» Design and analysis of optimal adaptive de-jitter buffers
Sort
View
INFOCOM
2008
IEEE
15 years 3 months ago
MPLOT: A Transport Protocol Exploiting Multipath Diversity Using Erasure Codes
—In this paper, we propose a novel transport protocol that effectively utilizes available bandwidth and diversity gains provided by heterogeneous, highly lossy paths. Our Multi-P...
Vicky Sharma, Shivkumar Kalyanaraman, Koushik Kar,...
106
Voted
ICNP
2007
IEEE
15 years 3 months ago
Scheduled PSM for Minimizing Energy in Wireless LANs
Power conservation is a general concern for mobile computing and communication. In this paper, we investigate the performance of the current 802.11 power saving mechanism (unschedu...
Yong He, Ruixi Yuan, Xiaojun Ma, Jun Li, C. Wang
IPCCC
2007
IEEE
15 years 3 months ago
Understanding Localized-Scanning Worms
— Localized scanning is a simple technique used by attackers to search for vulnerable hosts. Localized scanning trades off between the local and the global search of vulnerable h...
Zesheng Chen, Chao Chen, Chuanyi Ji
CIKM
2007
Springer
15 years 3 months ago
Developing learning strategies for topic-based summarization
Most up-to-date well-behaved topic-based summarization systems are built upon the extractive framework. They score the sentences based on the associated features by manually assig...
Ouyang You, Sujian Li, Wenjie Li
81
Voted
APSEC
2002
IEEE
15 years 2 months ago
Using Process Simulation to Compare Scheduling Strategies for Software Projects
We present a discrete simulation model for software projects which explicitly takes a scheduling strategy as input. The model represents varying staff skill levels, component coup...
Frank Padberg