Sciweavers

5948 search results - page 916 / 1190
» Computing Robust Counter-Strategies
Sort
View
CONEXT
2006
ACM
15 years 10 months ago
Using forgetful routing to control BGP table size
Running the Border Gateway Protocol (BGP), the Internet’s interdomain routing protocol, consumes a large amount of memory. A BGP-speaking router typically stores one or more rou...
Elliott Karpilovsky, Jennifer Rexford
ETRA
2006
ACM
143views Biometrics» more  ETRA 2006»
15 years 10 months ago
openEyes: a low-cost head-mounted eye-tracking solution
Eye tracking has long held the promise of being a useful methodology for human computer interaction. However, a number of barriers have stood in the way of the integration of eye ...
Dongheng Li, Jason S. Babcock, Derrick Parkhurst
MOBIWAC
2006
ACM
15 years 10 months ago
Indoor tracking in WLAN location with TOA measurements
Authors presented recently an indoor location technique based on Time Of Arrival (TOA) obtained from Round-Trip-Time (RTT) measurements at data link level and trilateration. This ...
Marc Ciurana, Francisco Barceló, Sebastiano...
NETGAMES
2006
ACM
15 years 10 months ago
Count down protocol: asynchronous consistent protocol in P2P virtual ball game
This paper studies a way to improve consistency of states in a ball game typed DVE with lag, in P2P architecture. We also study how to control shared objects in real-time in a ser...
Yoshihiro Kawano, Tatsuhiro Yonekura
SIGCOMM
2006
ACM
15 years 10 months ago
Policy-based routing with non-strict preferences
Traditional studies of routing problems often assumed strict preferences on paths, by eliminating ambiguity in path comparisons, or imposing a priori deterministic tie-breaking. S...
Chi-kin Chau