Sciweavers

8080 search results - page 214 / 1616
» From Computer Networks to Agent Networks
Sort
View
CIA
2008
Springer
15 years 5 months ago
Filter Allocation Using Iterative ECNP
Network devices can filter traffic in order to protect end-user computers against network worms and other threats. Since these devices have very limited memories and cannot deploy ...
Jan Tozicka, Stepán Urban, Magdalena Prokop...
AINA
2007
IEEE
15 years 10 months ago
Event based Extensible Interactive Transparent Networking: Performance Study with Fast TCP Principles
Interactive Transparent Networking has been proposed to support a new generation of symbiotic applications that require advance interaction with the Network. In this mode advanced...
Javed I. Khan, Pradeep K. Punnam, Raid Zaghal
NCA
2003
IEEE
15 years 9 months ago
Organizing a Distributed Application in a Mobile Ad Hoc Network
A distributed application that operates in an ad hoc network formed by mobile nodes must limit its use of all-to-all communication since the overall capacity of such a network is ...
Cristian Tuduce, Thomas R. Gross
134
Voted
ICNP
2002
IEEE
15 years 8 months ago
Power Mode Scheduling for Ad Hoc Networks
An ad hoc network is a group of mobile wireless nodes that cooperatively form a network among themselves without any fixed infrastructure. Increasingly, power consumption within ...
Santashil PalChaudhuri, David B. Johnson
CONEXT
2007
ACM
15 years 7 months ago
A cross-layer load-independent link cost metric for wireless mesh networks
We present Cross-layer Unicast Transmission Time (X-UTT), a MAC-aware load-independent link cost metric for 802.11based wireless mesh networks. X-UTT utilizes information acquired...
Marianna Carrera, Henrik Lundgren, Theodoros Salon...