Proceedings of the 2002 Conference on Applications, Technologies, Architectures, and Protocols for Computer Communications - S 2002
DOI: 10.1145/633030.633031
|View full text |Cite
|
Sign up to set email alerts
|

Informed content delivery across adaptive overlay networks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
16
0

Year Published

2006
2006
2013
2013

Publication Types

Select...
4
4
1

Relationship

0
9

Authors

Journals

citations
Cited by 18 publications
(16 citation statements)
references
References 0 publications
0
16
0
Order By: Relevance
“…In substitution to centralized and fully-coupled media flows, Application Layer Multicast (ALM) end-points based solution for large scale conference has been proposed [9][10][11]. These ALM solutions tend to produce self-organizing, efficient and self-improving overlay meshes that can be dynamically adapted to different network variations.…”
Section: A General Viewmentioning
confidence: 99%
“…In substitution to centralized and fully-coupled media flows, Application Layer Multicast (ALM) end-points based solution for large scale conference has been proposed [9][10][11]. These ALM solutions tend to produce self-organizing, efficient and self-improving overlay meshes that can be dynamically adapted to different network variations.…”
Section: A General Viewmentioning
confidence: 99%
“…In an application of overlay networks, continuous reconfiguration of virtual topology by overlay management strives to establish paths with the most desirable end-to-end characteristics. The approximate reconciliation tree of Byers et al [29] uses BFs on top of a tree structure to minimize the amount of data transmitted for verification.…”
Section: R Wmentioning
confidence: 99%
“…The approximate reconciliation tree for overlay networks by Byers et al [5] uses BFs on top of a tree structure to minimize the amount of data transmitted for verification. In the packet processing domain, BFs in [9,18] were widely adapted for fast query with the known collision rate setback.…”
Section: Bf's Applications In Networkingmentioning
confidence: 99%
“…Then, the probability Pr{X u = v}, v > 0 can be easily derived based on Eq. (4) as the following Pr{X u =v}= v=t 0 +t 1 +t 2 +t 3 P 0 (t 0 ) · P 0 (t 1 ) · P 0 (t 2 ) · P 0 (t 3 ) (5) because there are two HITs, l-HIT and r-HIT , each having 0-and 1-trees. The sum in Eq.…”
Section: • False Indexing To An On-chip Key Table For a Usmentioning
confidence: 99%