Sciweavers

2214 search results - page 119 / 443
» Dynamic Protocol Recovery
Sort
View
109
Voted
RIVF
2008
15 years 2 months ago
Robust overlay network with Self-Adaptive topology: Protocol description
We introduce a new overlay network named ROSA1 . Overlay networks offer a way to bypass the routing constraints of the underlying network. ROSA used this overlay network property t...
Loic Baud, Nguyen Pham, Patrick Bellot
77
Voted
CCIA
2009
Springer
15 years 1 months ago
2-LAMA Architecture vs. BitTorrent Protocol in a Peer-to-Peer Scenario
Abstract. In this paper, we review our Multi-Agent System (MAS) architecture (2LAMA) proposed to assist existing MAS. This architecture consists of two levels: the conventional MAS...
Jordi Campos Miralles, Maite López-Sá...
124
Voted
IJAHUC
2007
99views more  IJAHUC 2007»
15 years 20 days ago
Simulation study of some PRMA-based protocols with channel reservation for data traffic
: Medium Access Control (MAC) and resource allocation are two challenging issues in mobile network. Packet reservation multiple access (PRMA) is considered as a promising MAC proto...
Xue Jun Li, Peter Han Joo Chong
83
Voted
SIGMETRICS
2008
ACM
15 years 20 days ago
A view-probability-matrix approach to the modelling of gossiping protocols
This paper addresses the quantitative analysis of gossiping protocols. In contrast to existing approaches which are entirely based on the simulation of the individual nodes' ...
Thomas Krieger, Martin Riedl, Johann Schuster, Mar...
102
Voted
ICIP
2010
IEEE
14 years 10 months ago
Auction protocol for camera active control
In this paper, we apply the auction-based theories in economics to camera networks. We develop a set of auction protocols to do camera active control (pan/tilt/zoom) intelligently...
Yiming Li, Bir Bhanu, Wei Lin