Sciweavers

4744 search results - page 315 / 949
» Connected Computing
Sort
View
PAM
2010
Springer
15 years 11 months ago
An Experimental Performance Comparison of 3G and Wi-Fi
Mobile Internet users have two options for connectivity: pay premium fees to utilize 3G or wander around looking for open Wi-Fi access points. We perform an experimental evaluation...
Richard Gass, Christophe Diot
AINA
2009
IEEE
15 years 11 months ago
Improving Opportunistic Data Dissemination via Known Vector
An opportunistic network is a network where each node only has connectiviy with other nodes opportunistically. To disseminate data in this kind of network is a challenging task an...
Jyh-How Huang, Ying-Yu Chen, Yi-Chao Chen, Shivaka...
NOCS
2009
IEEE
15 years 11 months ago
CTC: An end-to-end flow control protocol for multi-core systems-on-chip
We propose Connection then Credits (CTC) as a new end-to-end flow control protocol to handle messagedependent deadlocks in networks-on-chip (NoC) for multicore systems-on-chip. C...
Nicola Concer, Luciano Bononi, Michael Soulie, Ric...
AINA
2008
IEEE
15 years 11 months ago
An Experience Improving Intrusion Detection Systems False Alarm Ratio by Using Honeypot
When traditional firewall and intrusion detection systems (IDS) are used to detect possible attacks from the network, they often make wrong decisions and block the legitimate conn...
Babak Khosravifar, Jamal Bentahar
FOCS
2008
IEEE
15 years 11 months ago
Some Results on Greedy Embeddings in Metric Spaces
Geographic Routing is a family of routing algorithms that uses geographic point locations as addresses for the purposes of routing. Such routing algorithms have proven to be both ...
Ankur Moitra, Tom Leighton