Sciweavers

1498 search results - page 130 / 300
» Collection tree protocol
Sort
View
ADL
1998
Springer
178views Digital Library» more  ADL 1998»
15 years 9 months ago
Distributed Digital Library Architecture Incorporating Different Index Styles
The New Zealand Digital Library offers several collections of information over the World Wide Web. Although fulltext indexing is the primary access mechanism, musical collections ...
Rodger J. McNab, Ian H. Witten, Stefan J. Boddie
GBRPR
2009
Springer
15 years 11 months ago
On Computing Canonical Subsets of Graph-Based Behavioral Representations
The collection of behavior protocols is a common practice in human factors research, but the analysis of these large data sets has always been a tedious and time-consuming process....
Walter C. Mankowski, Peter Bogunovich, Ali Shokouf...
126
Voted
TAMC
2009
Springer
15 years 11 months ago
Preserving Privacy versus Data Retention
The retention of communication data has recently attracted much public interest, mostly because of the possibility of its misuse. In this paper, we present protocols that address ...
Markus Hinkelmann, Andreas Jakoby
ICN
2007
Springer
15 years 11 months ago
Energy Efficiency in the Mobile Ad Hoc Networking Approach to Monitoring Farm Animals
—Using Mobile Ad Hoc Networks (MANETs) for monitoring bovine animals potentially offers high increase in the profitability of cattle production. In this paper we propose a formal...
Bartosz Wietrzyk, Milena Radenkovic
134
Voted
IAJIT
2010
87views more  IAJIT 2010»
15 years 3 months ago
A performance comparison of MD5 authenticated routing traffic with EIGRP, RIPv2, and OSPF
: Routing is the process of forwarding data across an inter-network from a designated source to a final destination. Along the way from source to destination, at least one intermed...
Khalid Abu Al-Saud, Hatim Mohd Tahir, Moutaz Saleh...