Sciweavers

537 search results - page 26 / 108
» Comparative Study of Protocols Used for Establishing VPN
Sort
View
ESA
2011
Springer
257views Algorithms» more  ESA 2011»
13 years 11 months ago
Social-Aware Forwarding Improves Routing Performance in Pocket Switched Networks
We study and characterize social-aware forwarding protocols in opportunistic networks and we derive bounds on the expected message delivery time for two different routing protocol...
Josep Díaz, Alberto Marchetti-Spaccamela, D...
ICWN
2003
15 years 1 months ago
Energy-Efficient Bootstrapping Protocol for Sensor Networks
Sensor networks are poised for increasingly wider uses in many military and civil applications. We present a bootstrapping protocol for a class of sensor networks in which the net...
Rajesh Mathew, Mohamed F. Younis
BERTINORO
2005
Springer
15 years 5 months ago
Emergent Consensus in Decentralised Systems Using Collaborative Reinforcement Learning
Abstract. This paper describes the application of a decentralised coordination algorithm, called Collaborative Reinforcement Learning (CRL), to two different distributed system pr...
Jim Dowling, Raymond Cunningham, Anthony Harringto...
JSS
1998
87views more  JSS 1998»
14 years 11 months ago
On using similarity for concurrency control in real-time database systems
Most of the proposed concurrency control protocols for real-time database systems (RTDBS) are based on serializability theorem. Owing to the unique characteristics of real-time da...
Kam-yiu Lam, Wai-cheong Yau
ICN
2007
Springer
15 years 6 months ago
Scalability of the OLSR Protocol with the Fish Eye Extension
— Multi-hop wireless ad-hoc networks are drawing more and more attention from both academic and industrial research. The lack of infrastructure makes those networks easy to deplo...
Dang Nguyen, Pascale Minet