Sciweavers

1647 search results - page 240 / 330
» Distributing private data in challenged network environments
Sort
View
GLOBECOM
2009
IEEE
16 years 5 days ago
A Suboptimal Network Utility Maximization Approach for Scalable Multimedia Applications
—Wired and wireless data networks have witnessed an explosive growth of inelastic traffics such as real-time or media streaming applications. Recently, applications relying on l...
Mohammad Sadegh Talebi, Ahmad Khonsari, Mohammad H...
CSCW
2004
ACM
15 years 10 months ago
Emergent networks, locus of control, and the pursuit of social capital
In this paper we examine the relationship between emergent social network characteristics in a computer-supported collaborative learning course and locus of control. An emergent c...
Michael Stefanone, Jeffrey T. Hancock, Geri Gay, A...
TMC
2010
137views more  TMC 2010»
15 years 3 months ago
A Metric for DISH Networks: Analysis, Implications, and Applications
—In wireless networks, node cooperation has been exploited as a data relaying mechanism for decades. However, the wireless channel allows for much richer interaction among nodes....
Tie Luo, Vikram Srinivasan, Mehul Motani
SENSYS
2003
ACM
15 years 10 months ago
CODA: congestion detection and avoidance in sensor networks
Event-driven sensor networks operate under an idle or light load and then suddenly become active in response to a detected or monitored event. The transport of event impulses is l...
Chieh-Yih Wan, Shane B. Eisenman, Andrew T. Campbe...
USENIX
1996
15 years 6 months ago
Transparent Fault Tolerance for Parallel Applications on Networks of Workstations
This paper describes a new method for providingtransparent fault tolerance for parallel applications on a network of workstations. We have designed our method in the context of sh...
Daniel J. Scales, Monica S. Lam