Sciweavers

2913 search results - page 211 / 583
» How Much to Copy
Sort
View
IPPS
2007
IEEE
15 years 7 months ago
Replication Strategy in Unstructured Peer-to-Peer Systems
1 The unstructured Peer-to-Peer (P2P) systems usually use a “blind search” method to find the requested data object by propagating a query to a number of peers randomly. In or...
Guofu Feng, Yuquan Jiang, Guihai Chen, Qing Gu, Sa...
98
Voted
MCAM
2007
Springer
125views Multimedia» more  MCAM 2007»
15 years 7 months ago
Fingerprinting Codes for Live Pay-Television Broadcast Via Internet
In recent years, with the rapid growth of the Internet as well as the increasing demand for broadband services, live pay-television broadcasting via internet has become a promising...
Shuhui Hou, Tetsutaro Uehara, Yoshitaka Morimura, ...
ICMB
2006
IEEE
206views Business» more  ICMB 2006»
15 years 6 months ago
E-Pass Using DRM in Symbian v8 OS and TrustZone : Securing Vital Data on Mobile Devices
The mobile phone industry has established a large customer base market, providing a wide range of mobile applications from voice and data services to digital media such as digital...
Wan Huzaini Wan Hussin, Reuben Edwards, Paul Coult...
106
Voted
ICNS
2006
IEEE
15 years 6 months ago
Anycast Algorithms Supporting Optical Burst Switched Grid Networks
— In this paper we consider implementing optical burst switching as a technology for building Grids with computationally intensive requirements. This architecture has been referr...
Marc De Leenheer, Farid Farahmand, Kejie Lu, Tao Z...
SIGMETRICS
2006
ACM
15 years 6 months ago
Fluid modeling of pollution proliferation in P2P networks
P2P systems are highly vulnerable to pollution attacks in which attackers inject multiple versions of corrupted content into the system, which is then further proliferated by unsu...
Rakesh Kumar, David D. Yao, Amitabha Bagchi, Keith...