Sciweavers

8770 search results - page 1398 / 1754
» Named Service Networking
Sort
View
ASUNAM
2010
IEEE
15 years 3 months ago
Mining Interaction Behaviors for Email Reply Order Prediction
—In email networks, user behaviors affect the way emails are sent and replied. While knowing these user behaviors can help to create more intelligent email services, there has no...
Byung-Won On, Ee-Peng Lim, Jing Jiang, Amruta Pura...
CP
2010
Springer
15 years 2 months ago
Load Balancing and Almost Symmetries for RAMBO Quorum Hosting
Abstract. Rambo is the Reconfigurable Atomic Memory for Basic Objects, a formally specified algorithm that implements atomic read/write shared memory in dynamic networks, where t...
Laurent Michel, Alexander A. Shvartsman, Elaine L....
ENTCS
2008
390views more  ENTCS 2008»
15 years 2 months ago
Cryptographic Versus Trust-based Methods for MANET Routing Security
Mobile Ad-hoc Networks (MANETs) allow wireless nodes to form a network without requiring a fixed infrastructure. Early routing protocols for MANETs failed to take security issues ...
Jared Cordasco, Susanne Wetzel
PERCOM
2010
ACM
15 years 2 months ago
Exploring quality in multisensor pervasive systems - a localization case study
This paper addresses quality vs. cost tradeoffs in multisensor pervasive spaces. Specifically, we focus on a case study that uses location sensing in instrumented pervasive spaces ...
Stefano Bonetti, Sharad Mehrotra, Nalini Venkatasu...
ICC
2009
IEEE
140views Communications» more  ICC 2009»
15 years 2 months ago
Approximation Algorithms for Traffic Grooming in WDM Rings
Abstract-- This paper addresses the problem of traffic grooming in WDM rings in which all traffic emanates from a single node and all other nodes are destination nodes. This "...
Kevin Corcoran, Seth Flaxman, Mark Neyer, Peter Sc...
« Prev « First page 1398 / 1754 Last » Next »