Sciweavers

7329 search results - page 1211 / 1466
» Network Extractor Protocols
Sort
View
P2P
2009
IEEE
115views Communications» more  P2P 2009»
15 years 11 months ago
Modeling and Analysis of Bandwidth-Inhomogeneous Swarms in BitTorrent
—A number of analytical models exists that capture various properties of the BitTorrent protocol. However, until now virtually all of these models have been based on the assumpti...
Michel Meulpolder, Johan A. Pouwelse, Dick H. J. E...
155
Voted
EUROPAR
2009
Springer
15 years 11 months ago
Adaptive Peer Sampling with Newscast
Abstract. The peer sampling service is a middleware service that provides random samples from a large decentralized network to support gossip-based applications such as multicast, ...
Norbert Tölgyesi, Márk Jelasity
WCNC
2008
IEEE
15 years 11 months ago
Quantize-and-Forward Relaying with M-ary Phase Shift Keying
Abstract—Using cooperative transmission, two or more singleantenna users can share their antennas to achieve spatial diversity in a slow fading channel. One relaying protocol tha...
Michael R. Souryal, Huiqing You
145
Voted
ICMCS
2006
IEEE
125views Multimedia» more  ICMCS 2006»
15 years 10 months ago
COSMOS: Peer-to-Peer Collaborative Streaming Among Mobiles
In traditional mobile streaming networks such as 3G cellular networks, all users pull streams from a server. Such pull model leads to high streaming cost and problem in system sca...
Man-Fung Leung, Shueng-Han Gary Chan, Oscar C. Au
NDSS
2006
IEEE
15 years 10 months ago
Trust Negotiation with Hidden Credentials, Hidden Policies, and Policy Cycles
In an open environment such as the Internet, the decision to collaborate with a stranger (e.g., by granting access to a resource) is often based on the characteristics (rather tha...
Keith B. Frikken, Jiangtao Li, Mikhail J. Atallah
« Prev « First page 1211 / 1466 Last » Next »