Sciweavers

724 search results - page 75 / 145
» Gossiping with Multiple Messages
Sort
View
JCM
2006
73views more  JCM 2006»
14 years 9 months ago
Wireless Networks Revenue Optimization through Overload Control with Priority Services
Wireless networks are currently experiencing more overload situations than their wireline counterparts because of explosive mobile traffic growth, unpredictable traffic behavior, s...
Haitao Lin, Preetam Ghosh, Prabir Das
SCN
2008
Springer
157views Communications» more  SCN 2008»
14 years 9 months ago
Insider attack attribution using signal strength-based hyperbolic location estimation
A rogue insider, in a wireless network, is an authenticated member that exploits possession of a valid identity in order to launch an attack. A typical example is the transmission...
Christine Laurendeau, Michel Barbeau
TON
2008
100views more  TON 2008»
14 years 9 months ago
Impact of hot-potato routing changes in IP networks
Abstract-- Despite the architectural separation between intradomain and interdomain routing in the Internet, intradomain protocols do influence the path-selection process in the Bo...
Renata Teixeira, Aman Shaikh, Timothy G. Griffin, ...
CI
2004
115views more  CI 2004»
14 years 9 months ago
A Conversational Approach to the Interaction With Web Services
The emerging standards for the specification of Web Services support the publication of the static interfaces of the operations they may execute. However, little attention is paid...
Liliana Ardissono, Giovanna Petrone, Marino Segnan
CONCURRENCY
1998
181views more  CONCURRENCY 1998»
14 years 9 months ago
Communication Performance of Java-Based Parallel Virtual Machines
Message passing libraries such as Parallel Virtual Machine PVM and Message Passing Interface MPI provide a common Application Programming Interface API to implement parallel...
Narendar Yalamanchilli, William W. Cohen