Sciweavers

248 search results - page 43 / 50
» Characterizing a spam traffic
Sort
View
E4MAS
2006
Springer
15 years 1 months ago
Exploiting the Environment for Coordinating Agent Intentions
One large and quite interesting family of MAS applications is characterized (1) by their large scale in terms of number of agents and physical distribution, (2) by their very dynam...
Tom Holvoet, Paul Valckenaers
ASPDAC
2008
ACM
94views Hardware» more  ASPDAC 2008»
14 years 11 months ago
Robust on-chip bus architecture synthesis for MPSoCs under random tasks arrival
A major trend in a modern system-on-chip design is a growing system complexity, which results in a sharp increase of communication traffic on the on-chip communication bus architec...
Sujan Pandey, Rolf Drechsler
AHSWN
2010
130views more  AHSWN 2010»
14 years 9 months ago
How Good is Opportunistic Routing? - A Reality Check under Rayleigh Fading Channels
Considerations of realistic channel dynamics motivate the design of a new breed of opportunistic schemes, such as opportunistic transmission, scheduling and routing. Compared to t...
Rong Zheng, Chengzhi Li
CN
2006
107views more  CN 2006»
14 years 9 months ago
BGP session lifetime modeling in congested networks
The reliable Border Gateway Protocol (BGP) is essential for supporting high quality Internet data communication. In present Internet, due to the lack of differentiation mechanism ...
Li Xiao, Guanghui He, Klara Nahrstedt
JDCTA
2008
85views more  JDCTA 2008»
14 years 9 months ago
A Non Scale Free Attribute of Convergent Address Window for Private Messaging
A convergent address window of web browsers accepts a destination address and a message string. The destination address can be domain names or any other form of addresses and is i...
Young S. Han