Sciweavers

15782 search results - page 2972 / 3157
» Network Optimization and Control
Sort
View
150
Voted
INFOCOM
2008
IEEE
15 years 10 months ago
MPLOT: A Transport Protocol Exploiting Multipath Diversity Using Erasure Codes
—In this paper, we propose a novel transport protocol that effectively utilizes available bandwidth and diversity gains provided by heterogeneous, highly lossy paths. Our Multi-P...
Vicky Sharma, Shivkumar Kalyanaraman, Koushik Kar,...
INFOCOM
2008
IEEE
15 years 10 months ago
Modeling the Evolution of Degree Correlation in Scale-Free Topology Generators
—In this paper, we examine the asymptotic behavior of degree correlation (i.e., the joint degree distribution of adjacent nodes) in several scale-free topology generators GED [13...
Xiaoming Wang, Xiliang Liu, Dmitri Loguinov
ISM
2008
IEEE
111views Multimedia» more  ISM 2008»
15 years 10 months ago
Secure and Low Cost Selective Encryption for JPEG2000
Selective encryption is a new trend in content protection. It aims at reducing the amount of data to encrypt while achieving a sufficient and inexpensive security. This approach ...
Ayoub Massoudi, Frédéric Lefè...
NOMS
2008
IEEE
15 years 10 months ago
Host-aware routing in multicast overlay backbone
— To support large-scale Internet-based broadcast of live streaming video efficiently in content delivery networks (CDNs), it is essential to implement a cost-effective overlay ...
Jun Guo, Sanjay Jha
239
Voted
PIMRC
2008
IEEE
15 years 10 months ago
A Distributed IP Mobility Approach for 3G SAE
—Future generations of mobile operator networks, based on an all-IP-based flat architecture and a multitude of different access technologies, require a proper IP-based mobility ...
Mathias Fischer, Frank-Uwe Andersen, Andreas K&oum...
« Prev « First page 2972 / 3157 Last » Next »