Computing Reviews
Today's Issue Hot Topics Search Browse Recommended My Account Log In
Browse by topic Browse by titles Authors Reviewers Browse by issue Browse Help
Search
  Lui, John C. Add to Alert Profile  
 
Options:
Date Reviewed  
  1 - 5 of 6 reviews    
  On the profitability of bundling sale strategy for online service markets with network effects
Ye L., Wu W., Ma R., Lui J. ACM Transactions on Internet Technology 19(3): 1-32, 2019.  Type: Article

Online services are usually provided over the Internet and telecommunications infrastructure. The online services focused on in this paper include Microsoft Office 365 (Word, PowerPoint, Excel, Access) and Internet service provider (IS...
...
Nov 4 2019  
  Incentive and service differentiation in P2P networks: a game theoretic approach
Ma R., Lee S., Lui J., Yau D. IEEE/ACM Transactions on Networking 14(5): 978-991, 2006.  Type: Article

Among the publications investigating anti-free-riding mechanisms for peer-to-peer (P2P) networks, few have such insightful, thorough, and mathematically proven analyses as those provided in this paper....
...
Apr 30 2007  
  Toward picture-perfect streaming on the Internet
Chow A., Golubchik L., Lui J.  The quantitative evaluation of systems (Proceedings of the Second International Conference on the Quantitative Evaluation of Systems (QEST’05),Sep 19-22, 2005) 632005.  Type: Proceedings

Normally, continuous media streaming deals with single-source data transmission. If the information loss goes beyond the correctable limit, however, the quality of the video suffers. Chow, Golubchik, and Lui seek to address this by usi...
...
Oct 18 2006  
  A game theoretic approach to provide incentive and service differentiation in P2P networks
Ma R., Lee S., Lui J., Yau D.  Measurement and modeling of computer systems (Proceedings of the Joint International Conference on Measurement and Modeling of Computer Systems, New York, NY, USA, Jun 10-14, 2004) 189-198, 2004.  Type: Proceedings

Thanks to the massive development of peer-to-peer (P2P) technologies, we can easily exchange files among many users by using specific applications such as Gnutella. The P2P file-sharing system depends on users’ willingnes...
...
Sep 22 2005  
  Defending against distributed denial-of-service attacks with max-min fair server-centric router throttles
Yau D., Lui J., Liang F., Yam Y. IEEE/ACM Transactions on Networking 13(1): 29-42, 2005.  Type: Article

A distributed denial of service (DDoS) attack occurs when malicious hosts overwhelm a victim server by directing an excessive volume of traffic to it. The authors present a server-centric router throttling approach for protecting a ser...
...
Jun 10 2005  

 
Display per column
 
Send Your Comments
Contact Us
Reproduction in whole or in part without permission is prohibited.   Copyright 1999-2024 ThinkLoud®
Terms of Use
| Privacy Policy