Sciweavers

2092 search results - page 295 / 419
» A Theory of Non-Deterministic Networks
Sort
View
HICSS
2005
IEEE
133views Biometrics» more  HICSS 2005»
15 years 5 months ago
Who Joins the Platform? The Case of the RFID Business Ecosystem
Today, many knowledge-based technology applications form a business ecosystem: a set of complex products and services made by multiple firms in which no firm is dominant. For this...
Anne Quaadgras
INFOCOM
2005
IEEE
15 years 5 months ago
Modelling and stability of FAST TCP
We discuss the modelling of FAST TCP and prove four stability results. Using the traditional continuous-time flow model, we prove, for general networks, that FAST TCP is globally ...
Jiantao Wang, David X. Wei, Steven H. Low
KDD
2005
ACM
127views Data Mining» more  KDD 2005»
15 years 5 months ago
Mining closed relational graphs with connectivity constraints
Relational graphs are widely used in modeling large scale networks such as biological networks and social networks. In this kind of graph, connectivity becomes critical in identif...
Xifeng Yan, Xianghong Jasmine Zhou, Jiawei Han
SIGCOMM
2004
ACM
15 years 5 months ago
Delayed stability and performance of distributed congestion control
Recent research efforts to design better Internet transport protocols combined with scalable Active Queue Management (AQM) have led to significant advances in congestion control...
Yueping Zhang, Seong-ryong Kang, Dmitri Loguinov
WMASH
2004
ACM
15 years 5 months ago
Reputation-based Wi-Fi deployment protocols and security analysis
In recent years, wireless Internet service providers (WISPs) have established thousands of WiFi hot spots in cafes, hotels and airports in order to offer to travelling Internet u...
Naouel Ben Salem, Jean-Pierre Hubaux, Markus Jakob...