Sciweavers

3319 search results - page 195 / 664
» The topology of dark networks
Sort
View
AAAI
2008
15 years 4 months ago
Generating Application-Specific Benchmark Models for Complex Systems
Automated generators for synthetic models and data can play a crucial role in designing new algorithms/modelframeworks, given the sparsity of benchmark models for empirical analys...
Jun Wang, Gregory M. Provan
GLOBECOM
2010
IEEE
14 years 11 months ago
Correlation-Resilient Path Selection in Multi-Path Routing
Multi-path routing is effective to enhance network availability, by selecting multiple failure-independent paths for reaching one destination in the hope to survive individual pat...
Xin Zhang, Adrian Perrig
121
Voted
INFOCOM
2007
IEEE
15 years 8 months ago
On Scalability of Proximity-Aware Peer-to-Peer Streaming
—P2P (peer-to-peer) technology has proved itself an efficient and cost-effective solution to support large-scale multimedia streaming. Different from traditional P2P application...
Liang Dai, Yi Cui, Yuan Xue
128
Voted
ICCD
2007
IEEE
105views Hardware» more  ICCD 2007»
15 years 5 months ago
Power-aware mapping for reconfigurable NoC architectures
A core mapping method for reconfigurable network-on-chip (NoC) architectures is presented in this paper. In most of the existing methods, mapping is carried out based on the traff...
Mehdi Modarressi, Hamid Sarbazi-Azad
CORR
2006
Springer
143views Education» more  CORR 2006»
15 years 1 months ago
Revealing the Autonomous System Taxonomy: The Machine Learning Approach
Although the Internet AS-level topology has been extensively studied over the past few years, little is known about the details of the AS taxonomy. An AS "node" can repre...
Xenofontas A. Dimitropoulos, Dmitri V. Krioukov, G...