Sciweavers

539 search results - page 39 / 108
» Modeling Network Contention Effects on All-to-All Operations
Sort
View
FGCS
2008
95views more  FGCS 2008»
14 years 10 months ago
SemreX: Efficient search in a semantic overlay for literature retrieval
The World Wide Web is growing at such a pace that even the biggest centralized search engines are able to index only a small part of the available documents on the Internet. The d...
Hai Jin, Hanhua Chen
ICNS
2009
IEEE
15 years 6 months ago
Nozzilla: A Peer-to-Peer IPTV Distribution Service for an IMS-Based NGN
—During the last years next generation networks (NGNs) have gained attention, as an increasing number of network operators moved toward triple-play services: telephony, Internet ...
Alex Bikfalvi, Jaime García-Reinoso, Iv&aac...
CCECE
2006
IEEE
15 years 5 months ago
A Dynamic Associative E-Learning Model based on a Spreading Activation Network
Presenting information to an e-learning environment is a challenge, mostly, because ofthe hypertextlhypermedia nature and the richness ofthe context and information provides. This...
Phongchai Nilas, Nilamit Nilas, Somsak Mitatha
AINA
2009
IEEE
15 years 6 months ago
A Simple Distributed ID Assignment Scheme for CSMA/IC Using Well Arranged Rotation ID in Ad Hoc Networks
Carrier Sense Multiple Access / ID Countdown (CSMA/IC) is a collision-free ad hoc MAC protocol. CSMA/IC avoids simultaneous medium access by competing with a local unique ID assig...
Ki-seok Lee, Cheeha Kim
WSC
2000
15 years 1 months ago
Predicting enemy force closure with simulation
This paper presents a model and an analysis done to predict enemy force closure. The simulation replaces a pencil and ruler method that has been used by Department of Defense plan...
Mark R. Grabau, Michael D. Payne