Sciweavers

7778 search results - page 1415 / 1556
» Designing Controllers for Reachability
Sort
View
139
Voted
SENSYS
2003
ACM
15 years 8 months ago
CODA: congestion detection and avoidance in sensor networks
Event-driven sensor networks operate under an idle or light load and then suddenly become active in response to a detected or monitored event. The transport of event impulses is l...
Chieh-Yih Wan, Shane B. Eisenman, Andrew T. Campbe...
126
Voted
SIGECOM
2003
ACM
122views ECommerce» more  SIGECOM 2003»
15 years 8 months ago
k-Implementation
This paper discusses an interested party who wishes to influence the behavior of agents in a game (multi-agent interaction), which is not under his control. The interested party ...
Dov Monderer, Moshe Tennenholtz
166
Voted
SIGMETRICS
2003
ACM
197views Hardware» more  SIGMETRICS 2003»
15 years 8 months ago
Modeling the throughput of TCP Vegas
Previous analytic models of TCP Vegas throughput have been developed for loss-free (all-Vegas) networks. This work develops a simple and accurate analytic model for the throughput...
Charalampos (Babis) Samios, Mary K. Vernon
148
Voted
SLIP
2003
ACM
15 years 8 months ago
Perimeter-degree: a priori metric for directly measuring and homogenizing interconnection complexity in multilevel placement
In this paper, we describe an accurate metric (perimeter-degree) for measuring interconnection complexity and effective use of it for controlling congestion in a multilevel framew...
Navaratnasothie Selvakkumaran, Phiroze N. Parakh, ...
140
Voted
GCC
2003
Springer
15 years 8 months ago
Constructing Secure Web Service Based on XML
The paper discusses XML security key technologies related with security of Web service. Based on these discussions, Web service is integrated with some mature security architecture...
Shaomin Zhang, Baoyi Wang, Lihua Zhou
« Prev « First page 1415 / 1556 Last » Next »