Sciweavers

CIC
2006
13 years 6 months ago
IIOP Failover in Dynamic Clusters
Abstract-Requirement: Clients should experience high-availability when accessing network services. Availability should be transparent and not require altering programs. Problem: Av...
Harold Carr, Ken Cavanaugh
CIC
2006
115views Communications» more  CIC 2006»
13 years 6 months ago
A Tone Dual-Channel DMAC Protocol in Location Unaware Ad Hoc Networks
- Directional antennas are used to improve spatial reuse, but have the problem of deafness. The DUDMAC protocol [9] uses the ORTS, OCTS, DDATA, and DACK mechanisms and a blocking a...
Eun-Ju Lee, Chang-Nam Kang, DoHyung Han, Doo-Yeong...
CIC
2006
111views Communications» more  CIC 2006»
13 years 6 months ago
A New Tree-based Tag Anti-collision Protocol for RFID Systems
Abstract-- This paper proposes a tree-based anti-collision protocol for tags in the UHF (ultra high frequency, 300MHz
Sung Hyun Kim, Min Kyo Shin, PooGyeon Park
CIC
2006
148views Communications» more  CIC 2006»
13 years 6 months ago
RPC LSP Detection and Fuzzy Control Mechanisms in ATM Based MPLS on BcN
A major goal of the BcN (Broadband Convergence Network) is to facilitate convergence of networks and services. Many transport-related technologies were considered. One technology ...
Chulsoo Kim, Semyung Park, Taewan Kim, Jungtae Lee
CIC
2006
121views Communications» more  CIC 2006»
13 years 6 months ago
Performance Studies of a Coding Scheme for a Slepian-Wolf Source Network
- We investigate the simplest Slepian-Wolf source network, consisting of an information source correlated with a second source used as a side-information for the decoder but not th...
Azizuddin Abdul Aziz, John C. Kieffer
CIC
2006
198views Communications» more  CIC 2006»
13 years 6 months ago
Design and Implementation of Desktop Video Conference System Based on Client-Server and P2P
- This paper describes the design and implementation of desktop video conference system using client-server and P2P(Peer to Peer). This systems is based on a client-server and P2P ...
Hyen Ki Kim, Jeng Neng Hwang
CIC
2006
122views Communications» more  CIC 2006»
13 years 6 months ago
On Fast Estimation of Network Bandwidth
Dulal C. Kar, Randy DeLeon
CIC
2006
104views Communications» more  CIC 2006»
13 years 6 months ago
Closed-Loop Congestion Control Protocol Design for Elastic Traffic
In the present paper, we outline few characteristics that every viable congestion control protocol for elastic traffic should satisfy. We provide and outline ways by which these c...
Omar Ait-Hellal
CIC
2006
109views Communications» more  CIC 2006»
13 years 6 months ago
Design and Implement of SD-Anycast Routing Protocol
Zheng Hong-Yuan, Xie Qiang, Chen Wen-Liang, Chen J...
CIC
2006
197views Communications» more  CIC 2006»
13 years 6 months ago
A Comment on the Throughput of Non-Persistent CSMA
Abstract- A better estimate of the throughput of nonpersistent CSMA without collision detection protocol is obtained by using a bus-star model. A bus when a station initiates trans...
Maher Heal