Sciweavers

AICT
2006
IEEE
130views Communications» more  AICT 2006»
13 years 6 months ago
A Search Theoretical Approach to P2P Networks: Analysis of Learning
One of the main characteristics of the peer-to-peer systems is the highly dynamic nature of the users present in the system. In such a rapidly changing enviroment, end-user guaran...
Nazif Cihan Tas, Bedri Kamil Onur Tas
AICT
2006
IEEE
118views Communications» more  AICT 2006»
13 years 6 months ago
Web Service Offerings Language (WSOL) Support for Context Management of Mobile/Embedded XML Web Services
Specification of monitored context properties and their influence on behavior of Web services and management activities is a prerequisite for contextsensitive operation, which is ...
Vladimir Tosic, Hanan Lutfiyya, Yazhe Tang
AICT
2006
IEEE
225views Communications» more  AICT 2006»
13 years 6 months ago
Migration to 4 G: Mobile IP based Solutions
Fourth Generation (4G) is the next generation of wireless networks that will replace third Generation (3G) networks sometimes in future. 4G is intended to provide high speed, high...
K. R. Santhi, G. Senthil Kumaran
AICT
2006
IEEE
102views Communications» more  AICT 2006»
13 years 6 months ago
Publishing, Retrieving and Streaming Lectures via Application Level Multicast
Structured peer-to-peer overlay network is an efficient solution for querying and retrieving resources spread between the peers. Unfortunately, key based routing of Distributed Ha...
Marco Milanesio, Giancarlo Ruffo
AICT
2006
IEEE
104views Communications» more  AICT 2006»
13 years 6 months ago
An Automation of Mail Channels
Mail channels allow an electronic mail (e-mail) user to have multiple points of contact, each with a potentially different policy. For example, a user may have two channels, one fo...
Nicholas M. Boers, Pawel Gburzynski
AICT
2006
IEEE
129views Communications» more  AICT 2006»
13 years 8 months ago
Stochastic Thresholding: An approach to Estimator Optimization via Fisher Information Maximization
In stochastic thresholding, the threshold for quantization of a signal is randomized. An estimator based on quantized signal data can be optimized through stochastic thresholding. ...
Samudra Dasgupta
AICT
2006
IEEE
123views Communications» more  AICT 2006»
13 years 8 months ago
Issues related to Development of Wireless Peer-to-Peer Games in J2ME
This paper describes and discusses challenges related to development of peer-to-peer games in J2ME using the available Bluetooth API (JSR82). By using Bluetooth on wireless device...
Alf Inge Wang, Michael Sars Norum, Carl-Henrik Wol...
AICT
2006
IEEE
110views Communications» more  AICT 2006»
13 years 8 months ago
Design and Implementation of the NetTraveler Middleware System based on Web Services
We present NetTraveler a database middleware system for WANs that is designed to efficiently run queries over sites that are either mobile clients or enterprise servers. NetTravel...
Elliot A. Vargas-Figueroa, Manuel Rodriguez-Martin...
AICT
2006
IEEE
13 years 8 months ago
Transfer Rate Models for Gnutella Signaling Traffic
This paper reports on transfer rate models for the Gnutella signaling protocol. New results on message-level and IP-level rates are presented. The models are based on traffic capt...
Dragos Ilie, David Erman, Adrian Popescu