Sciweavers

16206 search results - page 3174 / 3242
» At Issue
Sort
View
JCM
2010
119views more  JCM 2010»
14 years 10 months ago
Evaluation of Router Implementations for Explicit Congestion Control Schemes
— Explicit congestion control schemes use router feedback to overcome limitations of the standard mechanisms of the Transmission Control Protocol (TCP). These approaches require ...
Simon Hauger, Michael Scharf, Jochen Kögel, C...
JCS
2010
104views more  JCS 2010»
14 years 10 months ago
Finding the PKI needles in the Internet haystack
Public-key cryptography can uniquely enable trust within distributed settings. Employing it usually requires deploying a set of tools and services collectively known as a public k...
Massimiliano Pala, Sean W. Smith
JCST
2010
119views more  JCST 2010»
14 years 10 months ago
Location, Localization, and Localizability
Abstract Location-aware technology spawns numerous unforeseen pervasive applications in a wide range of living, production, commence, and public services. This article provides an ...
Yunhao Liu, Zheng Yang, Xiaoping Wang, Lirong Jian
JIDM
2010
160views more  JIDM 2010»
14 years 10 months ago
Evaluation of Conditional Preference Queries
The need for incorporating preference querying in database technology is a very important issue in a variety of applications ranging from e-commerce to personalized search engines....
Fabiola S. F. Pereira, Sandra de Amo
JIRS
2010
153views more  JIRS 2010»
14 years 10 months ago
Active Visual Perception for Mobile Robot Localization
Abstract Localization is a key issue for a mobile robot, in particular in environments where a globally accurate positioning system, such as GPS, is not available. In these environ...
Javier Correa, Alvaro Soto
« Prev « First page 3174 / 3242 Last » Next »