Sciweavers

5324 search results - page 834 / 1065
» Internet Security Protocols
Sort
View
CORR
1999
Springer
67views Education» more  CORR 1999»
15 years 11 days ago
ZBroker: A Query Routing Broker for Z39.50 Databases
A query routing broker is a software agent that determines from a large set of accessing information sources the ones most relevant to a user's information need. As the numbe...
Yong Lin, Jian Xu, Ee-Peng Lim, Wee Keong Ng
95
Voted
MMS
2002
15 years 11 days ago
A proxy architecture for collaborative media streaming
Streaming media from the Internet is a successful application for end-users. With the upcoming success of mobile devices and home networking environments, cooperation among users ...
Verena Kahmann, Lars C. Wolf
125
Voted
PE
2002
Springer
124views Optimization» more  PE 2002»
15 years 11 days ago
Continuous-time hidden Markov models for network performance evaluation
In this paper, we study the use of continuous-time hidden Markov models (CT-HMMs) for network protocol and application performance evaluation. We develop an algorithm to infer the...
Wei Wei, Bing Wang, Donald F. Towsley
INFOCOM
2010
IEEE
14 years 11 months ago
Greedy Forwarding in Dynamic Scale-Free Networks Embedded in Hyperbolic Metric Spaces
In this paper we show that complex (scale-free) network topologies naturally emerge from hyperbolic metric spaces. The hyperbolic geometry can be used to facilitate maximally efï¬...
Fragkiskos Papadopoulos, Dmitri V. Krioukov, Mari&...
107
Voted
ISOLA
2010
Springer
14 years 11 months ago
Towards More Adaptive Voice Applications
With the Internet designed to provide best-effort packet transmission, applications are expected to adapt dynamically to the operating conditions observed in the network. For this ...
Jörg Ott