Sciweavers

5107 search results - page 954 / 1022
» Design Issue Of ECTST
Sort
View
GRID
2006
Springer
14 years 9 months ago
Applying Peer-to-Peer Techniques to Grid Replica Location Services
Peer-to-peer systems offer attractive system management properties, including the ability of components that join the network to self-organize; scalability up to tens of thousands...
Ann L. Chervenak, Min Cai
IJSNET
2008
113views more  IJSNET 2008»
14 years 9 months ago
Reservation-based protocol for monitoring applications using IEEE 802.15.4 sensor networks
: The IEEE 802.15.4 and Zigbee are protocols aimed at low-duty and low-power wireless sensor networks. Continuously monitoring applications such as applications of structural healt...
Vidya Krishnamurthy, Edward Sazonov
CN
2007
97views more  CN 2007»
14 years 9 months ago
A longest prefix first search tree for IP lookup
- One of the key design issues for IP routers is the IP Lookup mechanism. IP lookup is an important action in router that is to find the next hop of each incoming packet with a lon...
Lih-Chyau Wuu, Tzong-Jye Liu, Kuo-Ming Chen
IIE
2006
108views more  IIE 2006»
14 years 9 months ago
Towards the Information Society - the Case of Finnnish Teacher Education
Abstract. The use of Information and Communication Technology (ICT) in education is one important competence that student teacher should develop in their academic studies. To be ca...
Johani Rautopuro, Susanna Pöntinen, Jari Kukk...
IJBC
2006
93views more  IJBC 2006»
14 years 9 months ago
Some Basic Cryptographic Requirements for Chaos-Based Cryptosystems
In recent years, a large amount of work on chaos-based cryptosystems have been published. However many of the proposed schemes fail to explain or do not possess a number of featur...
Gonzalo Álvarez, Shujun Li