Sciweavers

KIVS
2005
Springer
13 years 9 months ago
Reconfigurable consumer direct logistics systems
Abstract: The goals of the interdisciplinary project HORN were as well to improve competitiveness of service providers that deliver grocery items as to develop new hardware and sof...
Sébastien Truchat, Alexander Pflaum
KIVS
2005
Springer
13 years 9 months ago
Making Chord go mobile
: The Chord protocol is a structured Peer-to-Peer (P2P) protocol based on distributed hash tables (DHT). By using hash keys to identify the nodes in the network and also the shared...
Stefan Zöls, Rüdiger Schollmeier, Wolfga...
KIVS
2005
Springer
13 years 9 months ago
Router Aided Congestion Avoidance with Scalable Performance Signaling
This paper justifies using explicit performance signaling in support of congestion control by means of a simple yet efficient scheme called “Congestion Avoidance with Distribute...
Michael Welzl
KIVS
2005
Springer
13 years 9 months ago
Peer-to-Peer-Systeme und -Anwendungen
Ralf Steinmetz, Klaus Wehrle, Oliver Heckmann
KIVS
2005
Springer
13 years 9 months ago
An Integrated Simulator for Inter-Domain Scenarios
Abstract. The simulation of large-scale inter-domain networks is useful for various aspects of network planning and management. It is also a challenge due to its scalability proble...
Matthias Scheidegger, Florian Baumgartner, Torsten...
KIVS
2005
Springer
13 years 9 months ago
A Comparison of WS-BusinessActivity and BPEL4WS Long-Running Transaction
Although WS-BusinessActivity and BPEL4WS Long-Running Transaction (LRT) are conceptually very similar and are both designed to support the execution of complex business transaction...
Patrick Sauter, Ingo Melzer
KIVS
2005
Springer
13 years 9 months ago
Dezentrale Steuerung verteilter Anwendungen mit rationalen Agenten
Abstract Herkömmliche Methoden für die Steuerung und Koordination verteilter Anwendungen mit weitgehend autonomen Diensten und Prozessen in heterogenen, sich dynamisch ändernden...
Alexander Pokahr, Lars Braubach, Winfried Lamersdo...
KIVS
2005
Springer
13 years 9 months ago
Exploiting Regular Hot-Spots for Drive-thru Internet
Abstract. IEEE 802.11 WLAN technology has become an inexpensive, yet powerful access technology that is targeted at mobile users that remain within reach of the hot-spot. Such hot-...
Jörg Ott, Dirk Kutscher
KIVS
2005
Springer
13 years 9 months ago
P2P Replication Revisited: Mobile Infrastructures
Abstract: Traffic engineering in P2P networks deals with organizing overlay networks. The challenge of unavailability has not been mastered yet. Considering the resource allocatio...
Jens O. Oberender, Hermann de Meer
KIVS
2005
Springer
13 years 9 months ago
On the Distribution of Nodes in Distributed Hash Tables
: We develop a model for the distribution of nodes in ring-based DHTs like Chord that position nodes randomly or based on hash-functions. As benefit of our model we get the distri...
Heiko Niedermayer, Simon Rieche, Klaus Wehrle, Geo...