Sciweavers

7544 search results - page 1349 / 1509
» Network Forensics Analysis
Sort
View
INFOCOM
2005
IEEE
15 years 10 months ago
Limiting path exploration in BGP
— Slow convergence in the Internet can be directly attributed to the “path exploration” phenomenon, inherent in all path vector protocols. The root cause for path exploration...
Jaideep Chandrashekar, Zhenhai Duan, Zhi-Li Zhang,...
INFOCOM
2005
IEEE
15 years 10 months ago
dPAM: a distributed prefetching protocol for scalable asynchronous multicast in P2P systems
— We leverage the buffering capabilities of end-systems to achieve scalable, asynchronous delivery of streams in a peer-to-peer environment. Unlike existing cache-and-relay schem...
Abhishek Sharma, Azer Bestavros, Ibrahim Matta
IPPS
2005
IEEE
15 years 10 months ago
Stream PRAM
Parallel random access memory, or PRAM, is a now venerable model of parallel computation that that still retains its usefulness for the design and analysis of parallel algorithms....
Darrell R. Ulm, Michael Scherger
ISCC
2005
IEEE
146views Communications» more  ISCC 2005»
15 years 10 months ago
A Credit-Based On-Demand QoS Routing Protocol over Bluetooth WPANs
The quality-of-service (QoS) communication that supports mobile applications to guarantee bandwidth utilization is an important issue for Bluetooth wireless personal area networks...
Yuh-Shyan Chen, Keng-Shau Liu, Yun-Wei Lin
P2P
2005
IEEE
104views Communications» more  P2P 2005»
15 years 10 months ago
Range Queries in Trie-Structured Overlays
Among the open problems in P2P systems, support for non-trivial search predicates, standardized query languages, distributed query processing, query load balancing, and quality of...
Anwitaman Datta, Manfred Hauswirth, Renault John, ...
« Prev « First page 1349 / 1509 Last » Next »