Sciweavers

981 search results - page 153 / 197
» A Performance Analysis of the iSCSI Protocol
Sort
View
ECCV
2006
Springer
16 years 1 months ago
Scene Classification Via pLSA
Given a set of images of scenes containing multiple object categories (e.g. grass, roads, buildings) our objective is to discover these objects in each image in an unsupervised man...
Anna Bosch, Andrew Zisserman, Xavier Muñoz
SIGCOMM
2009
ACM
15 years 5 months ago
In defense of wireless carrier sense
Carrier sense is often used to regulate concurrency in wireless medium access control (MAC) protocols, balancing interference protection and spatial reuse. Carrier sense is known ...
Micah Z. Brodsky, Robert T. Morris
108
Voted
VTC
2007
IEEE
15 years 5 months ago
Opportunistic Relay Selection with Limited Feedback
Abstract— It has been shown that a decentralized relay selection protocol based on opportunistic feedback from the relays yields good throughput performance in dense wireless net...
Caleb K. Lo, Robert W. Heath Jr., Sriram Vishwanat...
TWC
2008
156views more  TWC 2008»
14 years 11 months ago
Dynamic Bandwidth Allocation for QoS Provisioning in IEEE 802.16 Networks with ARQ-SA
In this paper, bandwidth allocation, in terms of distributing available data slots among different users, is studied for QoS provisioning in IEEE 802.16 networks. By considering th...
Weiwei Wang, Zihua Guo, Xuemin Shen, Changjia Chen...
NGC
2000
Springer
115views Communications» more  NGC 2000»
15 years 2 months ago
Hierarchical reliable multicast
The use of proxies for local error recovery and congestion control is a scalable technique used to overcome a number of wellknown problems in Reliable Multicast (RM). The idea is ...
Athina Markopoulou, Fouad A. Tobagi