Sciweavers

537 search results - page 26 / 108
» Comparative Study of Protocols Used for Establishing VPN
Sort
View
ESA
2011
Springer
257views Algorithms» more  ESA 2011»
13 years 9 months ago
Social-Aware Forwarding Improves Routing Performance in Pocket Switched Networks
We study and characterize social-aware forwarding protocols in opportunistic networks and we derive bounds on the expected message delivery time for two different routing protocol...
Josep Díaz, Alberto Marchetti-Spaccamela, D...
ICWN
2003
14 years 11 months ago
Energy-Efficient Bootstrapping Protocol for Sensor Networks
Sensor networks are poised for increasingly wider uses in many military and civil applications. We present a bootstrapping protocol for a class of sensor networks in which the net...
Rajesh Mathew, Mohamed F. Younis
BERTINORO
2005
Springer
15 years 3 months ago
Emergent Consensus in Decentralised Systems Using Collaborative Reinforcement Learning
Abstract. This paper describes the application of a decentralised coordination algorithm, called Collaborative Reinforcement Learning (CRL), to two different distributed system pr...
Jim Dowling, Raymond Cunningham, Anthony Harringto...
JSS
1998
87views more  JSS 1998»
14 years 9 months ago
On using similarity for concurrency control in real-time database systems
Most of the proposed concurrency control protocols for real-time database systems (RTDBS) are based on serializability theorem. Owing to the unique characteristics of real-time da...
Kam-yiu Lam, Wai-cheong Yau
ICN
2007
Springer
15 years 4 months ago
Scalability of the OLSR Protocol with the Fish Eye Extension
— Multi-hop wireless ad-hoc networks are drawing more and more attention from both academic and industrial research. The lack of infrastructure makes those networks easy to deplo...
Dang Nguyen, Pascale Minet