Sciweavers

7329 search results - page 1281 / 1466
» Network Extractor Protocols
Sort
View
SODA
2004
ACM
120views Algorithms» more  SODA 2004»
15 years 5 months ago
Optimal routing in Chord
We propose optimal routing algorithms for Chord [1], a popular topology for routing in peer-to-peer networks. Chord is an undirected graph on 2b nodes arranged in a circle, with e...
Prasanna Ganesan, Gurmeet Singh Manku
ISPE
2003
15 years 5 months ago
PLIB ontology for B2B electronic commerce
: Currently computers are changing from single isolated devices to entry points into a world wide network of information exchange and business transactions called the World Wide We...
Youcef Aklouf, Guy Pierra, Yamine Aït Ameur, ...
MMNS
2003
102views Multimedia» more  MMNS 2003»
15 years 5 months ago
A Heuristic Algorithm for the Multi-constrained Multicast Tree
Multicasting is an important communication mechanism for implementing real-time multimedia applications, which usually require the underlying network to provide a number of quality...
Wen-Lin Yang
OSDI
2000
ACM
15 years 5 months ago
End-to-End Authorization
Many boundaries impede the flow of authorization information, forcing applications that span those boundaries into hop-by-hop approaches to authorization. We present a unified app...
Jon Howell, David Kotz
ICASSP
2010
IEEE
15 years 4 months ago
Implementation of cooperative communications using software defined radios
—Cooperative communications leverages the spatial diversity available in a wireless network enabling multiple radio nodes work together to improve the overall system performance....
Michael Knox, Elza Erkip
« Prev « First page 1281 / 1466 Last » Next »