Sciweavers

1414 search results - page 117 / 283
» Cover Time and Broadcast Time
Sort
View
ICASSP
2009
IEEE
15 years 4 months ago
The speed of greed: Characterizing myopic gossip through network voracity
This paper analyzes the rate of convergence of greedy gossip with eavesdropping (GGE). In previous work, we proposed GGE, a fast gossip algorithm based on exploiting the broadcast...
Deniz Üstebay, Boris N. Oreshkin, Mark Coates...
89
Voted
DFMA
2005
IEEE
100views Multimedia» more  DFMA 2005»
15 years 3 months ago
Mobile Computing to Facilitate Interaction in Lectures and Meetings
The Campus Mobile project explored how PDAs and innovative interfaces can improve interaction during lectures and in small meetings. These mobile computers (small PCs or PDAs) are...
Isabelle M. Demeure, Claudie Faure, Eric Lecolinet...
ICC
2000
IEEE
153views Communications» more  ICC 2000»
15 years 2 months ago
Collision-Avoidance Transmission Scheduling for Ad-Hoc Networks
Abstract— A novel multichannel schedule-based Medium Access Control (MAC) protocol for ad-hoc networks, named collision-avoidance transmission scheduling (CATS) is introduced. CA...
Zhenyu Tang, J. J. Garcia-Luna-Aceves
EDCC
1999
Springer
15 years 2 months ago
A Fault Tolerant Clock Synchronization Algorithm for Systems with Low-Precision Oscillators
In this paper we present a new fault tolerant clock synchronization algorithm called the Fault Tolerant Daisy Chain algorithm. It is intended for internal clock synchronization of...
Henrik Lönn
EUC
2006
Springer
15 years 1 months ago
Hybrid Dissemination Based Scalable and Adaptive Context Delivery for Ubiquitous Computing
Context delivery is an inevitable issue for ubiquitous computing. Context-aware middlewares perform all the functions of context sensing, inferring and delivery to context-aware ap...
Lenin Mehedy, Md. Kamrul Hasan, Young-Koo Lee, Sun...