Sciweavers

346 search results - page 56 / 70
» Propagating Probabilities in System P
Sort
View
ICCCN
2007
IEEE
15 years 6 months ago
Understanding Peer-level Performance in BitTorrent: A Measurement Study
—The observed performance by individual peers in BitTorrent can be simply measured by their average download rate. While it is often stated that the observed peer-level performan...
Amir H. Rasti, Reza Rejaie
CHES
2005
Springer
108views Cryptology» more  CHES 2005»
15 years 5 months ago
Further Hidden Markov Model Cryptanalysis
We extend the model of Karlof and Wagner for modelling side channel attacks via Input Driven Hidden Markov Models (IDHMM) to the case where not every state corresponds to a single ...
P. J. Green, Richard Noad, Nigel P. Smart
HICSS
2003
IEEE
148views Biometrics» more  HICSS 2003»
15 years 5 months ago
Bluenet II - A Detailed Realization of the Algorithm and Performance
The recent interest in ad hoc networks, in general, and in the Bluetooth technology, in particular, has stimulated much research in algorithms for topology control of such network...
Zhifang Wang, Zygmunt J. Haas, Robert J. Thomas
DM
2007
83views more  DM 2007»
14 years 11 months ago
Codes identifying sets of vertices in random networks
In this paper we deal with codes identifying sets of vertices in random networks; that is, (1, ≤ ℓ)-identifying codes. These codes enable us to detect sets of faulty processor...
Alan M. Frieze, Ryan Martin, Julien Moncel, Mikl&o...
IPPS
2008
IEEE
15 years 6 months ago
Heterogenous dating service with application to rumor spreading
Peer-to-Peer overlay networks have proven their efficiency for storing and retrieving data at large scale, but new services are required to take the actual performances of resour...
Olivier Beaumont, Philippe Duchon, Miroslaw Korzen...