Sciweavers

2912 search results - page 173 / 583
» Overlay Networks - Implementation by Specification
Sort
View
160
Voted
INFOCOM
2010
IEEE
15 years 1 months ago
MIS: Malicious Nodes Identification Scheme in Network-Coding-Based Peer-to-Peer Streaming
Network coding has been shown to be capable of greatly improving quality of service in P2P live streaming systems (e.g., IPTV). However, network coding is vulnerable to pollution a...
Qiyan Wang, Long Vu, Klara Nahrstedt, Himanshu Khu...
GLOBECOM
2009
IEEE
15 years 10 months ago
Dynamic Power Management in Cognitive Radio Networks Based on Constrained Stochastic Games
Abstract—Recent studies have been conducted to indicate the ineffective usage of licensed bands due to the static spectrum allocation. In order to improve the spectrum utilizatio...
Chia-Wei Wang, Yu-Pin Hsu, Kai-Ten Feng
108
Voted
ICC
2007
IEEE
143views Communications» more  ICC 2007»
15 years 10 months ago
Application-Aware Topology Formation Algorithm for Peer-to-Peer Networks
—When constructing an unstructured P2P topology, one should consider the application running on top of it in order to achieve a good performance for the whole P2P system. It is n...
Kin Wah Kwong, Danny H. K. Tsang
140
Voted
ICCCN
2007
IEEE
15 years 10 months ago
Large-Scale QoS-Aware Service-Oriented Networking with a Clustering-Based Approach
—Motivated by the fact that most of the existing QoS service composition solutions have limited scalability, we develop a hierarchical-based solution framework to achieve scalabi...
Jingwen Jin, Jin Liang, Jingyi Jin, Klara Nahrsted...
138
Voted
HPCC
2007
Springer
15 years 9 months ago
CDACAN: A Scalable Structured P2P Network Based on Continuous Discrete Approach and CAN
Abstract. CAN is a famous structured peer-to-peer network based on ddimensional torus topology with constant degree and logarithmical diameter, but suffers from poor scalability wh...
Lingwei Li, Qunwei Xue, Deke Guo