Sciweavers

448 search results - page 90 / 90
» k-anonymous message transmission
Sort
View
WICOMM
2010
143views more  WICOMM 2010»
14 years 10 months ago
Routing for cognitive radio networks consisting of opportunistic links
Cognitive radio (CR) has been considered a key technology to enhance overall spectrum utilization by opportunistic transmissions in CR transmitter-receiver link(s). However, CRs m...
Kwang-Cheng Chen, Bilge Kartal Cetin, Yu-Cheng Pen...
GLOBECOM
2010
IEEE
14 years 9 months ago
Efficient Uplink Bandwidth Utilization in P2P-TV Streaming Systems
Peer-to-Peer streaming systems (or P2P-TV) have been studied in the literature for some time, and they are becoming popular among users as well. P2P-TV systems target the real time...
Alessandra Carta, Marco Mellia, Michela Meo, Stefa...
VEE
2012
ACM
218views Virtualization» more  VEE 2012»
13 years 7 months ago
Enhancing TCP throughput of highly available virtual machines via speculative communication
Checkpoint-recovery based virtual machine (VM) replication is an attractive technique for accommodating VM installations with high-availability. It provides seamless failover for ...
Balazs Gerofi, Yutaka Ishikawa