102 results on '"Lui, J.C.S."'
Search Results
2. Multi-path continuous media streaming: what are the benefits?
3. Optimal insensitive routing and bandwidth sharing in simple data networks
4. Proceedings of the 2005 ACM SIGMETRICS international conference on Measurement and modeling of computer systems, Banff, AB, Canada - June 06 - 10, 2005
5. Incentive and Service Differentiation in P2P Networks: A Game Theoretic Approach
6. Distributed collaborative key agreement and authentication protocols for dynamic peer Groups
7. You can run, but you can't hide: an effective statistical methodology to trace back DDoS attackers
8. A multikey secure multimedia proxy using asymmetric reversible parametric sequences: theory, design, and implementation
9. Toward picture-perfect streaming on the Internet
10. A proportional-delay diffserv-enabled web server: admission control and dynamic adaptation
11. An incentive mechanism for P2P networks
12. Exploring the optimal replication strategy in P2P-VoD systems: Characterization and evaluation.
13. Identity attack and anonymity protection for P2P-VoD systems.
14. A Secure Cloud Backup System with Assured Deletion and Version Control.
15. Analyzing credit evolution for credit-based incentive schemes in wireless mesh networks.
16. Empirical analysis of the evolution of follower network: A case study on Douban.
17. Identifying Pollution Attackers in Network-Coding Enabled Wireless Mesh Networks.
18. Friends or Foes: Detecting Dishonest Recommenders in Online Social Networks.
19. NCFS: On the Practicality and Extensibility of a Network-Coding-Based Distributed File System.
20. Credit-based network management.
21. Analysis of Adaptive Incentive Protocols for P2P Networks.
22. On Modeling Clustering Indexes of BT-Like Systems.
23. How Many Packets Can We Encode? - An Analysis of Practical Wireless Network Coding.
24. Design and analysis of ISP-friendly file distribution protocols.
25. Application Identification Based on Network Behavioral Profiles.
26. ISP uplink pricing in a competitive market.
27. A Simple Model for Analyzing P2P Streaming Protocols.
28. Performance metrics and configuration strategies for group network communication.
29. Balancing Throughput and Fairness for TCP Flows in Multihop Ad-Hoc Networks.
30. Automatic recovery from disk failure in continuous-media servers
31. Use of analytical performance models for system sizing and resource allocation in interactive video-on-demand systems employing data sharing techniques
32. Bounding of performance measures for threshold-based queuing systems: theory and application to dynamic resource management in video-on-demand servers
33. A Case for TCP-Friendly Admission Control.
34. Stochastic Analysis and File Availability Enhancement for BT-like File Sharing Systems.
35. Modeling the Peering and Routing Tussle between ISPs and P2P Applications.
36. Adaptive Flow Aggregation - A New Solution for Robust Flow Monitoring under Security Attacks.
37. Detecting cheaters for multiplayer games: theory, design and implementation[1].
38. The Delicate Tradeoffs in BitTorrent-like File Sharing Protocol Design.
39. On the Practical and Security Issues of Batch Content Distribution Via Network Coding.
40. Stochastic Differential Equation Approach to Model BitTorrent-like P2P Systems.
41. An efficient partitioning algorithm for distributed virtual environment systems
42. Defending against low-rate TCP attacks: dynamic detection and protection.
43. On the robustness of soft state protocols.
44. An incentive mechanism for P2P networks.
45. Small world overlay P2P networks.
46. Adaptive proportional delay differentiated services: characterization and performance evaluation
47. Constructing communication subgraphs and deriving an optimal synchronization interval for distributed virtual environment systems
48. Defending against distributed denial-of-service attacks with max-min fair server-centric router throttles.
49. An architectural infrastructure and topological optimization for end system multicast.
50. You can run, but you can't hide: an effective methodology to traceback DDoS attackers.
Catalog
Books, media, physical & digital resources
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.