Sciweavers

23557 search results - page 4423 / 4712
» Distributed Computing - Introduction
Sort
View
ICDCSW
2008
IEEE
15 years 9 months ago
Scalable AOI-Cast for Peer-to-Peer Networked Virtual Environments
Networked virtual environments (NVEs) are computergenerated virtual worlds where users interact by exchanging messages via network connections. Each NVE user often pays attention ...
Jehn-Ruey Jiang, Yu-Li Huang, Shun-Yun Hu
ICDCSW
2008
IEEE
15 years 9 months ago
Fast Link Assessment in Wireless Mesh Networks by Using Non-Constant Weight Code
Abstract— The wireless mesh network is experiencing tremendous growth with the standardization of IEEE 802.11 and IEEE 802.16 technologies. Compared to its wired counterpart, the...
Ravi Nelavelli, Rajesh Prasad, Hongyi Wu
ICDCSW
2008
IEEE
15 years 9 months ago
On Feasibility of P2P On-Demand Streaming via Empirical VoD User Behavior Analysis
—In its current art, peer-to-peer streaming solution has been mainly employed in the domain of live event broadcasting. In such a paradigm, users are required to simultaneously p...
Bin Chang, Liang Dai, Yi Cui, Yuan Xue
IEEEPACT
2008
IEEE
15 years 9 months ago
Characterizing and modeling the behavior of context switch misses
One of the essential features in modern computer systems is context switching, which allows multiple threads of execution to time-share a limited number of processors. While very ...
Fang Liu, Fei Guo, Yan Solihin, Seongbeom Kim, Abd...
P2P
2008
IEEE
137views Communications» more  P2P 2008»
15 years 9 months ago
Hierarchical Codes: How to Make Erasure Codes Attractive for Peer-to-Peer Storage Systems
Redundancy is the basic technique to provide reliability in storage systems consisting of multiple components. A redundancy scheme defines how the redundant data are produced and...
Alessandro Duminuco, Ernst Biersack
« Prev « First page 4423 / 4712 Last » Next »