Sciweavers

7329 search results - page 1222 / 1466
» Network Extractor Protocols
Sort
View
147
Voted
MIDDLEWARE
2007
Springer
15 years 10 months ago
Peer-to-peer brokering of planning meta-data
In self-adaptive systems, metadata about resources in the system (e.g., services, nodes) must be dynamically published, updated, and removed. Current middleware approaches use sta...
Johannes Oudenstad, Frank Eliassen, Eli Gjø...
HICSS
2006
IEEE
134views Biometrics» more  HICSS 2006»
15 years 10 months ago
Differentiated Priority Scheduling and Adaptive Segmentation for Bluetooth Piconets
Bluetooth is a wireless communication technology, aimed at supporting connectivity among close proximity mobile devices. Bluetooth enables the design of low-power, low-cost, and s...
Jyothsna Kalvala, Gergely V. Záruba
119
Voted
ICMCS
2006
IEEE
97views Multimedia» more  ICMCS 2006»
15 years 10 months ago
Utilizing SSR Indications for Improved Video Communication in Presence of 802.11B Residue Errors
Radio hardware used for the reception of 802.11b frames is capable of associating a Signal to Silence Ratio (SSR) with each received frame. If a received frame is corrupted, then ...
Shirish S. Karande, Utpal Parrikar, Kiran Misra, H...
ICDCSW
2005
IEEE
15 years 10 months ago
Parallel Bindings in Distributed Multimedia Systems
Today’s multimedia environments are characterized by different stationary and a growing number of mobile devices, like PDAs or even mobile phones. To meet their requirements reg...
Michael Repplinger, Florian Winter, Marco Lohse, P...
INFOCOM
2005
IEEE
15 years 10 months ago
Limiting path exploration in BGP
— Slow convergence in the Internet can be directly attributed to the “path exploration” phenomenon, inherent in all path vector protocols. The root cause for path exploration...
Jaideep Chandrashekar, Zhenhai Duan, Zhi-Li Zhang,...
« Prev « First page 1222 / 1466 Last » Next »