Sciweavers

539 search results - page 58 / 108
» Modeling Network Contention Effects on All-to-All Operations
Sort
View
ISCC
2008
IEEE
135views Communications» more  ISCC 2008»
15 years 6 months ago
Analysis of compressed depth and image streaming on unreliable networks
This paper explores the issues connected to the transmission of three dimensional scenes over unreliable networks such as the wireless ones. It analyzes the effect of the loss of ...
Pietro Zanuttigh, Andrea Zanella, Guido M. Cortela...
IJCV
2007
159views more  IJCV 2007»
14 years 11 months ago
Face Hallucination: Theory and Practice
In this paper, we study face hallucination, or synthesizing a high-resolution face image from an input low-resolution image, with the help of a large collection of other high-reso...
Ce Liu, Heung-Yeung Shum, William T. Freeman
SIGCOMM
2009
ACM
15 years 6 months ago
SmartRE: an architecture for coordinated network-wide redundancy elimination
Application-independent Redundancy Elimination (RE), or identifying and removing repeated content from network transfers, has been used with great success for improving network pe...
Ashok Anand, Vyas Sekar, Aditya Akella
TON
2008
102views more  TON 2008»
14 years 11 months ago
Internet traffic behavior profiling for network security monitoring
Abstract--Recent spates of cyber-attacks and frequent emergence of applications affecting Internet traffic dynamics have made it imperative to develop effective techniques that can...
Kuai Xu, Zhi-Li Zhang, Supratik Bhattacharyya
CORR
2006
Springer
119views Education» more  CORR 2006»
14 years 12 months ago
Clustering and Sharing Incentives in BitTorrent Systems
Peer-to-peer protocols play an increasingly instrumental role in Internet content distribution. It is therefore important to gain a complete understanding of how these protocols b...
Arnaud Legout, Nikitas Liogkas, Eddie Kohler, Lixi...