Sciweavers

7941 search results - page 1573 / 1589
» Network Analysis of Repositories
Sort
View
121
Voted
CN
2010
149views more  CN 2010»
15 years 2 months ago
A collaborative P2P scheme for NAT Traversal Server discovery based on topological information
In the current Internet picture more than 70% of the hosts are located behind Network Address Translators (NATs). This is not a problem in the client/server paradigm. However, the...
Rubén Cuevas Rumín, Ángel Cue...
126
Voted
CN
2008
84views more  CN 2008»
15 years 2 months ago
A router-based technique to mitigate reduction of quality (RoQ) attacks
We propose a router-based technique to mitigate the stealthy reduction of quality (RoQ) attacks at the routers in the Internet. The RoQ attacks have been shown to impair the QoS s...
Amey Shevtekar, Nirwan Ansari
CORR
2010
Springer
158views Education» more  CORR 2010»
15 years 2 months ago
Architecture for Cooperative Prefetching in P2P Video-on- Demand System
Most P2P VoD schemes focused on service architectures and overlays optimization without considering segments rarity and the performance of prefetching strategies. As a result, the...
Ubaid Abbasi, Toufik Ahmed
DKE
2008
109views more  DKE 2008»
15 years 1 months ago
Deterministic algorithms for sampling count data
Processing and extracting meaningful knowledge from count data is an important problem in data mining. The volume of data is increasing dramatically as the data is generated by da...
Hüseyin Akcan, Alex Astashyn, Hervé Br...
ADHOC
2006
86views more  ADHOC 2006»
15 years 1 months ago
Energy considerations for topology-unaware TDMA MAC protocols
Since the energy budget of mobile nodes is limited, the performance of a networking protocol for such users should be evaluated in terms of its energy efficiency, in addition to t...
Konstantinos Oikonomou, Ioannis Stavrakakis
« Prev « First page 1573 / 1589 Last » Next »