Sciweavers

2945 search results - page 438 / 589
» Noisy Network Coding
Sort
View
72
Voted
INFOCOM
2007
IEEE
15 years 4 months ago
Exploring VoD in P2P Swarming Systems
Abstract—Digital media companies have recently started embracing P2P networks as an alternative distribution mechanism. However, with current P2P swarming systems users need to d...
Siddhartha Annapureddy, Saikat Guha, Christos Gkan...
74
Voted
IPPS
2007
IEEE
15 years 4 months ago
Link Shutdown Opportunities During Collective Communications in 3-D Torus Nets
As modern computing clusters used in scientific computing applications scale to ever-larger sizes and capabilities, their operational energy costs have become prohibitive. While ...
S. Conner, Sayaka Akioka, Mary Jane Irwin, Padma R...
MUE
2007
IEEE
106views Multimedia» more  MUE 2007»
15 years 4 months ago
PKTown: A Peer-to-Peer Middleware to Support Multiplayer Online Games
Peer-to-Peer (P2P) system can support service for lots of end users with little hardware investment, which suits for the efforts to lower down the service cost for Multiplayer Onl...
Hai Jin, Hong Yao, Xiaofei Liao, Sirui Yang, Wei L...
APSEC
2006
IEEE
15 years 4 months ago
Testing of Timer Function Blocks in FBD
Testing for time-related behaviors of PLC software is important and should be performed carefully. We propose a structural testing technique on Function Block Diagram(FBD) network...
Eunkyoung Jee, Seungjae Jeon, Hojung Bang, Sung De...
DASC
2006
IEEE
15 years 4 months ago
On Recognizing Virtual Honeypots and Countermeasures
— Honeypots are decoys designed to trap, delay, and gather information about attackers. We can use honeypot logs to analyze attackers’ behaviors and design new defenses. A virt...
Xinwen Fu, Wei Yu, Dan Cheng, Xuejun Tan, Kevin St...