Sciweavers

7329 search results - page 1132 / 1466
» Network Extractor Protocols
Sort
View
RTAS
2000
IEEE
15 years 8 months ago
Policing Offloaded
Policing of incoming packets can produce very high load in worst-case situations on a receiving computer. In realtime systems, resources must be allocated for such worstcase situa...
Uwe Dannowski, Hermann Härtig
GLOBECOM
2009
IEEE
15 years 8 months ago
A Simple Greedy Algorithm for Link Scheduling with the Physical Interference Model
—In wireless networks, mutual interference prevents wireless devices from correctly receiving packages from others and becomes one of the challenges in the design of protocols fo...
Dejun Yang, Xi Fang, Nan Li, Guoliang Xue
AAAI
2008
15 years 7 months ago
Personalisation of Telecommunications Services as Combinatorial Optimisation
Modern feature-rich telecommunications services offer significant opportunities to human users. To make these services more usable, facilitating personalisation is very important....
David Lesaint, Deepak Mehta, Barry O'Sullivan, Lui...
CONEXT
2007
ACM
15 years 7 months ago
Extending web browsers architectures to support HTTP session mobility
In a bid to extend web browsers capabilities, a new extension that transfers HTTP session between two web browsers also knows as User Agents will be developed. The capabilities of...
Michael O. Adeyeye, Neco Ventura
ECUMN
2007
Springer
15 years 7 months ago
Towards Sensor Integration into Multimedia Applications
Since few years, several applications are proposed on mobile devices. However, these applications are not aware of their physical environment. The emergence of wireless sensors, a...
Christine Louberry, Philippe Roose, Marc Dalmau
« Prev « First page 1132 / 1466 Last » Next »