Sciweavers

4676 search results - page 834 / 936
» Distributed networking system for Internet access service
Sort
View
FTCS
1993
97views more  FTCS 1993»
15 years 8 days ago
Virtually-Synchronous Communication Based on a Weak Failure Suspector
Failure detectors (or, more accurately Failure Suspectors { FS) appear to be a fundamental service upon which to build fault-tolerant, distributed applications. This paper shows t...
André Schiper, Aleta Ricciardi
IOR
2007
82views more  IOR 2007»
14 years 11 months ago
Compensating for Failures with Flexible Servers
We consider the problem of maximizing capacity in a queueing network with flexible servers, where the classes and servers are subject to failure. We assume that the interarrival ...
Sigrún Andradóttir, Hayriye Ayhan, D...
AVI
2008
15 years 1 months ago
Agent warp engine: formula based shape warping for networked applications
Computer visualization and networking have advanced dramatically over the last few years, partially driven by the exploding video game market. 3D hardware acceleration has reached...
Alexander Repenning, Andri Ioannidou
ICMCS
2006
IEEE
141views Multimedia» more  ICMCS 2006»
15 years 5 months ago
Ripple-Stream: Safeguarding P2P Streaming Against Dos Attacks
— Compared with file-sharing and distributed hash table (DHT) network, P2P streaming is more vulnerable to denial of service (DoS) attacks because of its high bandwidth demand a...
Wenjie Wang, Yongqiang Xiong, Qian Zhang, Sugih Ja...
86
Voted
TWC
2008
120views more  TWC 2008»
14 years 10 months ago
A cartel maintenance framework to enforce cooperation in wireless networks with selfish users
Abstract-- In distributed wireless networks without centralized control, each user is its own authority to maximize its own performance. This distributed characteristic provides th...
Zhu Han, Zhu Ji, K. J. Ray Liu