Sciweavers

7329 search results - page 1245 / 1466
» Network Extractor Protocols
Sort
View
ESA
2005
Springer
114views Algorithms» more  ESA 2005»
15 years 10 months ago
Making Chord Robust to Byzantine Attacks
Chord is a distributed hash table (DHT) that requires only O(logn) links per node and performs searches with latency and message cost O(logn), where n is the number of peers in the...
Amos Fiat, Jared Saia, Maxwell Young
FCT
2005
Springer
15 years 10 months ago
Almost Optimal Explicit Selectors
We understand selection by intersection as distinguishing a single element of a set by the uniqueness of its occurrence in some other set. More precisely, given two sets A and B, i...
Bogdan S. Chlebus, Dariusz R. Kowalski
MUM
2004
ACM
154views Multimedia» more  MUM 2004»
15 years 9 months ago
Plug-and-play application platform: towards mobile peer-to-peer
While peer-to-peer (P2P) has emerged as a new hot communication concept among the Internet users, mobile usage of P2P applications is still taking its first steps. This article fi...
Erkki Harjula, Mika Ylianttila, Jussi Ala-Kurikka,...
NOSSDAV
2004
Springer
15 years 9 months ago
Considering altruism in peer-to-peer internet streaming broadcast
In peer-to-peer overlay for video broadcast, peers contribute a portion of the bandwidth to the overlay in return for the service. In the presence of network heterogeneity, it is ...
Yang-Hua Chu, Hui Zhang
NOSSDAV
2004
Springer
15 years 9 months ago
AMPS: a flexible, scalable proxy testbed for implementing streaming services
— We present the design, implementation, and performance evaluation of AMPS — a flexible, scalable proxy testbed that supports a wide and extensible set of next-generation pro...
Xiaolan (Ellen) Zhang, Michael K. Bradshaw, Yang G...
« Prev « First page 1245 / 1466 Last » Next »