Sciweavers

7080 search results - page 1409 / 1416
» Designing High Integrity Systems Using Aspects
Sort
View
P2P
2009
IEEE
115views Communications» more  P2P 2009»
15 years 5 months ago
Modeling and Analysis of Bandwidth-Inhomogeneous Swarms in BitTorrent
—A number of analytical models exists that capture various properties of the BitTorrent protocol. However, until now virtually all of these models have been based on the assumpti...
Michel Meulpolder, Johan A. Pouwelse, Dick H. J. E...
ATAL
2007
Springer
15 years 4 months ago
Conditional random fields for activity recognition
Activity recognition is a key component for creating intelligent, multi-agent systems. Intrinsically, activity recognition is a temporal classification problem. In this paper, we...
Douglas L. Vail, Manuela M. Veloso, John D. Laffer...
IPSN
2004
Springer
15 years 3 months ago
Lattice sensor networks: capacity limits, optimal routing and robustness to failures
We study network capacity limits and optimal routing algorithms for regular sensor networks, namely, square and torus grid sensor networks, in both, the static case (no node failu...
Guillermo Barrenechea, Baltasar Beferull-Lozano, M...
ICMCS
1999
IEEE
150views Multimedia» more  ICMCS 1999»
15 years 2 months ago
DIVeR: A Dynamic Interactive Video Retrieval Protocol for Disk Array Based Servers
Video-on-demand (VOD) is a very promising multimedia application of the near future. In order for such a service to be commercially viable, efficient storage and retrieval schemes...
Senthil Sengodan, Victor O. K. Li
ACSC
2004
IEEE
15 years 2 months ago
A RMI Protocol for Aglets
Aglets is a mobile agent system that allows an agent to move with its code and execution state across the network to interact with other entities. Aglets utilizes Java RMI to supp...
Feng Lu, Kris Bubendorfer
« Prev « First page 1409 / 1416 Last » Next »