Sciweavers

7329 search results - page 1350 / 1466
» Network Extractor Protocols
Sort
View
108
Voted
ISMIR
2005
Springer
172views Music» more  ISMIR 2005»
15 years 9 months ago
Segmentation and Recognition of Tabla Strokes
A system that segments and labels tabla strokes from real performances is described. Performance is evaluated on a large database taken from three performers under different recor...
Parag Chordia
111
Voted
SIGMETRICS
2004
ACM
108views Hardware» more  SIGMETRICS 2004»
15 years 9 months ago
Uncooperative congestion control
—Traditionally uncooperative rate control schemes have implied open loop protocols such as UDP, CBR. In this paper we show that closed loop uncooperative rate control schemes als...
Kartikeya Chandrayana, Shivkumar Kalyanaraman
156
Voted
SASN
2003
ACM
15 years 9 months ago
Admission control in Peer-to-Peer: design and performance evaluation
Peer-to-Peer (P2P) applications and services are very common in today’s computing. The popularity of the P2P paradigm prompts the need for specialized security services which ma...
Nitesh Saxena, Gene Tsudik, Jeong Hyun Yi
167
Voted
SIGMETRICS
2003
ACM
197views Hardware» more  SIGMETRICS 2003»
15 years 9 months ago
Modeling the throughput of TCP Vegas
Previous analytic models of TCP Vegas throughput have been developed for loss-free (all-Vegas) networks. This work develops a simple and accurate analytic model for the throughput...
Charalampos (Babis) Samios, Mary K. Vernon
WORDS
2002
IEEE
15 years 8 months ago
Service Differentiation of Communication-bound Processes in a Real-Time Operating System
The majority of today’s Internet-based services are generally not concerned about the level of Quality of Service (QoS) presented to their users. For many such services, however...
Domenico Cotroneo, Massimo Ficco, Mauro Gargiulo, ...
« Prev « First page 1350 / 1466 Last » Next »