Sciweavers

13895 search results - page 2501 / 2779
» Exploring
Sort
View
113
Voted
ICDCSW
2003
IEEE
15 years 8 months ago
Foundations of Security for Hash Chains in Ad Hoc Networks
Nodes in ad hoc networks generally transmit data at regular intervals over long periods of time. Recently, ad hoc network nodes have been built that run on little power and have v...
Phillip G. Bradford, Olga V. Gavrylyako
128
Voted
ICRA
2003
IEEE
126views Robotics» more  ICRA 2003»
15 years 8 months ago
Experimental analysis of an innovative prosthetic hand with proprioceptive sensors
— This paper presents an underactuated artificial hand intended for functional replacement of the natural hand in upper limb amputees. The natural hand has three basic functiona...
Maria Chiara Carrozza, Fabrizio Vecchi, F. Sebasti...
106
Voted
INFOCOM
2003
IEEE
15 years 8 months ago
IP-Subnet Aware Routing in WDM Mesh Networks
Abstract— We explore the problem of routing bandwidth guaranteed paths in wavelength-routed, WDM optical mesh networks. A WDM mesh network offers great flexibility in dynamicall...
Swarup Acharya, Bhawna Gupta, Pankaj Risbood, Anur...
141
Voted
INFOCOM
2003
IEEE
15 years 8 months ago
Modeling Peer-Peer File Sharing Systems
— Peer-peer networking has recently emerged as a new paradigm for building distributed networked applications. In this paper we develop simple mathematical models to explore and ...
Zihui Ge, Daniel R. Figueiredo, Sharad Jaiswal, Ja...
112
Voted
INFOCOM
2003
IEEE
15 years 8 months ago
TCP-LP: A Distributed Algorithm for Low Priority Data Transfer
— Service prioritization among different traffic classes is an important goal for the future Internet. Conventional approaches to solving this problem consider the existing best...
Aleksandar Kuzmanovic, Edward W. Knightly
« Prev « First page 2501 / 2779 Last » Next »