Sciweavers

12257 search results - page 2126 / 2452
» Analysis of Algorithms
Sort
View
ICNP
2005
IEEE
15 years 10 months ago
Exploiting Dynamic Querying like Flooding Techniques in Unstructured Peer-to-Peer Networks
In unstructured peer-to-peer networks, controlled flooding aims at locating an item at the minimum message cost. Dynamic querying is a new controlled flooding technique. While i...
Hongbo Jiang, Shudong Jin
ICNP
2005
IEEE
15 years 10 months ago
Efficient Hop ID based Routing for Sparse Ad Hoc Networks
Routing in mobile ad hoc networks remains as a challenging problem given the limited wireless bandwidth, users’ mobility and potentially large scale. Recently, there has been a ...
Yao Zhao, Bo Li, Qian Zhang, Yan Chen, Wenwu Zhu
ICPP
2005
IEEE
15 years 10 months ago
Integrated Performance Monitoring of a Cosmology Application on Leading HEC Platforms
The Cosmic Microwave Background (CMB) is an exquisitely sensitive probe of the fundamental parameters of cosmology. Extracting this information is computationally intensive, requi...
Julian Borrill, Jonathan Carter, Leonid Oliker, Da...
ICRA
2005
IEEE
98views Robotics» more  ICRA 2005»
15 years 10 months ago
The Design of a Mobile Robot for Instrument Network Deployment in Antarctica
- This paper describes the design and fabrication of a low cost, solar powered mobile robot to support a variety of scientific missions on the Antarctic plateau during the austral ...
Laura E. Ray, Alexander D. Price, Alexander D. Str...
INFOCOM
2005
IEEE
15 years 10 months ago
Limiting path exploration in BGP
— Slow convergence in the Internet can be directly attributed to the “path exploration” phenomenon, inherent in all path vector protocols. The root cause for path exploration...
Jaideep Chandrashekar, Zhenhai Duan, Zhi-Li Zhang,...
« Prev « First page 2126 / 2452 Last » Next »