Sciweavers

5324 search results - page 834 / 1065
» Internet Security Protocols
Sort
View
CORR
1999
Springer
67views Education» more  CORR 1999»
15 years 3 months ago
ZBroker: A Query Routing Broker for Z39.50 Databases
A query routing broker is a software agent that determines from a large set of accessing information sources the ones most relevant to a user's information need. As the numbe...
Yong Lin, Jian Xu, Ee-Peng Lim, Wee Keong Ng
MMS
2002
15 years 3 months ago
A proxy architecture for collaborative media streaming
Streaming media from the Internet is a successful application for end-users. With the upcoming success of mobile devices and home networking environments, cooperation among users ...
Verena Kahmann, Lars C. Wolf
158
Voted
PE
2002
Springer
124views Optimization» more  PE 2002»
15 years 3 months ago
Continuous-time hidden Markov models for network performance evaluation
In this paper, we study the use of continuous-time hidden Markov models (CT-HMMs) for network protocol and application performance evaluation. We develop an algorithm to infer the...
Wei Wei, Bing Wang, Donald F. Towsley
INFOCOM
2010
IEEE
15 years 2 months ago
Greedy Forwarding in Dynamic Scale-Free Networks Embedded in Hyperbolic Metric Spaces
In this paper we show that complex (scale-free) network topologies naturally emerge from hyperbolic metric spaces. The hyperbolic geometry can be used to facilitate maximally efï¬...
Fragkiskos Papadopoulos, Dmitri V. Krioukov, Mari&...
ISOLA
2010
Springer
15 years 2 months ago
Towards More Adaptive Voice Applications
With the Internet designed to provide best-effort packet transmission, applications are expected to adapt dynamically to the operating conditions observed in the network. For this ...
Jörg Ott