Sciweavers

23557 search results - page 4451 / 4712
» Distributed Computing - Introduction
Sort
View
DSN
2003
IEEE
15 years 8 months ago
Dependability Enhancement for IEEE 802.11 Wireless LAN with Redundancy Techniques
The presence of physical obstacles and radio interference results in the so called “shadow regions” in wireless networks. When a mobile station roams into a shadow region, it ...
Dongyan Chen, Sachin Garg, Chandra M. R. Kintala, ...
HICSS
2003
IEEE
215views Biometrics» more  HICSS 2003»
15 years 8 months ago
A Field Study of Use of Synchronous Chat in Online Courses
A field study of Computer Mediated Communication (CMC) as used in higher education asks the questions, "Will students take part in synchronous chat sessions if they are sched...
David H. Spencer, Starr Roxanne Hiltz
ICDCSW
2003
IEEE
15 years 8 months ago
Foundations of Security for Hash Chains in Ad Hoc Networks
Nodes in ad hoc networks generally transmit data at regular intervals over long periods of time. Recently, ad hoc network nodes have been built that run on little power and have v...
Phillip G. Bradford, Olga V. Gavrylyako
ICDCSW
2003
IEEE
15 years 8 months ago
CATP: A Context-Aware Transportation Protocol for HTTP
— The rendering mechanism used in Web browsers have a significant impact on the user behavior and delay tolerance of retrieval. The head-of-line blocking phenomena prevents the ...
Huamin Chen, Prasant Mohapatra
ICDCSW
2003
IEEE
15 years 8 months ago
Autonomous Cooperation Technologies for Achieving Real Time Property and Fault Tolerance in Service Oriented Community System
The advancement of wireless communication and mobile telecommunication has made mobile commerce possible. In the retail business under the evolving market, the users would like to...
Naohiro Kaji, Khaled Ragab, Takanori Ono, Kinji Mo...
« Prev « First page 4451 / 4712 Last » Next »