Sciweavers

1144 search results - page 156 / 229
» Implementation of end-to-end abstractions in a network servi...
Sort
View
TDP
2010
189views more  TDP 2010»
14 years 8 months ago
The PROBE Framework for the Personalized Cloaking of Private Locations
The widespread adoption of location-based services (LBS) raises increasing concerns for the protection of personal location information. A common strategy, referred to as obfuscati...
Maria Luisa Damiani, Elisa Bertino, Claudio Silves...
MM
2005
ACM
121views Multimedia» more  MM 2005»
15 years 7 months ago
Impact of incentive mechanisms on quality of experience
Since entities participating in P2P networks are usually autonomous and therefore free to decide on their level of participation, mechanisms to resolve conflicts between individu...
Andrew Roczniak, Abdulmotaleb El-Saddik
CNSR
2006
IEEE
138views Communications» more  CNSR 2006»
15 years 7 months ago
MPLS-based Multicast Shared Trees
Abstract— This paper presents a study of our proposed architecture for the setup of a MultiPoint-to-MultiPoint (MP2MP) Label Switched Path (LSP). This form of LSP is needed for e...
Ashraf Matrawy, Wei Yi, Ioannis Lambadaris, Chung-...
CSUR
2006
147views more  CSUR 2006»
15 years 1 months ago
A survey of research and practices of Network-on-chip
resents a perspective on existing NoC research. We define the following abstractions: system, network adapter, network, and link to explain and structure the fundamental concepts. ...
Tobias Bjerregaard, Shankar Mahadevan
TOMACS
1998
140views more  TOMACS 1998»
15 years 1 months ago
Technical Note: A Hierarchical Computer Architecture Design and Simulation Environment
architectures at multiple levels of abstraction, encompassing both hardware and software. It has five modes of operation (Design, Model Validation, Build Simulation, Simulate Syste...
Paul S. Coe, Fred W. Howell, Roland N. Ibbett, Lau...