Sciweavers

13536 search results - page 2680 / 2708
» Performance and control of network systems
Sort
View
TIP
2010
107views more  TIP 2010»
14 years 6 months ago
Risk-Distortion Analysis for Video Collusion Attacks: A Mouse-and-Cat Game
Copyright protection is a key issue for video sharing over public networks. To protect the video content from unauthorized redistribution, digital fingerprinting is commonly used. ...
Yan Chen, W. Sabrina Lin, K. J. Ray Liu
TON
2010
167views more  TON 2010»
14 years 6 months ago
A Machine Learning Approach to TCP Throughput Prediction
TCP throughput prediction is an important capability in wide area overlay and multi-homed networks where multiple paths may exist between data sources and receivers. In this paper...
Mariyam Mirza, Joel Sommers, Paul Barford, Xiaojin...
TWC
2010
14 years 6 months ago
Outage Probability Analysis of Cognitive Transmissions: Impact of Spectrum Sensing Overhead
In cognitive radio networks, a cognitive source node requires two essential phases to complete a cognitive transmission process: the phase of spectrum sensing with a certain time d...
YuLong Zou, Yu-Dong Yao, Baoyu Zheng
CCS
2009
ACM
16 years 13 days ago
Towards complete node enumeration in a peer-to-peer botnet
Modern advanced botnets may employ a decentralized peer-to-peer overlay network to bootstrap and maintain their command and control channels, making them more resilient to traditi...
Brent ByungHoon Kang, Eric Chan-Tin, Christopher P...
SAGA
2007
Springer
15 years 6 months ago
Probabilistic Techniques in Algorithmic Game Theory
We consider applications of probabilistic techniques in the framework of algorithmic game theory. We focus on three distinct case studies: (i) The exploitation of the probabilistic...
Spyros C. Kontogiannis, Paul G. Spirakis
« Prev « First page 2680 / 2708 Last » Next »