Sciweavers

2912 search results - page 192 / 583
» Overlay Networks - Implementation by Specification
Sort
View
140
Voted
NETGAMES
2003
ACM
15 years 9 months ago
Priority-based distribution trees for application-level multicast
In this paper, we propose a novel multicast routing algorithm that is based on application-level priorities and network characteristics: The application may specify an individual ...
Jürgen Vogel, Jörg Widmer, Dirk Farin, M...
132
Voted
IPTPS
2003
Springer
15 years 9 months ago
On the Feasibility of Peer-to-Peer Web Indexing and Search
This paper discusses the feasibility of peer-to-peer full-text keyword search of the Web. Two classes of keyword search techniques are in use or have been proposed: flooding of q...
Jinyang Li, Boon Thau Loo, Joseph M. Hellerstein, ...
142
Voted
ICNP
2002
IEEE
15 years 8 months ago
A Lightweight, Robust P2P System to Handle Flash Crowds
Abstract— Internet flash crowds (a.k.a. hot spots) are a phenomenon that result from a sudden, unpredicted increase in an on-line object’s popularity. Currently, there is no e...
Angelos Stavrou, Dan Rubenstein, Sambit Sahu
123
Voted
DEBS
2010
ACM
15 years 7 months ago
Quilt: a patchwork of multicast regions
Network bottlenecks, firewalls, restrictions on IP Multicast availability and administrative policies have long prevented the use of multicast even where the fit seems obvious. ...
Qi Huang, Ymir Vigfusson, Ken Birman, Haoyuan Li
103
Voted
DIMVA
2007
15 years 5 months ago
Characterizing Bots' Remote Control Behavior
A botnet is a collection of bots, each generally running on a compromised system and responding to commands over a “commandand-control” overlay network. We investigate observab...
Elizabeth Stinson, John C. Mitchell