Sciweavers

7329 search results - page 1308 / 1466
» Network Extractor Protocols
Sort
View
ICNP
2006
IEEE
15 years 10 months ago
Scaling IP Routing with the Core Router-Integrated Overlay
— IP routing scalability is based on hierarchical routing, which requires that the IP address hierarchy be aligned with the physical topology. Both site multi-homing and switchin...
Xinyang Zhang, Paul Francis, Jia Wang, Kaoru Yoshi...
ICNP
2006
IEEE
15 years 10 months ago
DPTree: A Balanced Tree Based Indexing Framework for Peer-to-Peer Systems
— Peer-to-peer (P2P) systems have been widely used for exchange of voluminous information and resources among thousands or even millions of users. Since shared data are normally ...
Mei Li, Wang-Chien Lee, Anand Sivasubramaniam
129
Voted
ICPPW
2006
IEEE
15 years 10 months ago
m-LPN: An Approach Towards a Dependable Trust Model for Pervasive Computing Applications
Trust, the fundamental basis of ‘cooperation’ – one of the most important characteristics for the performance of pervasive ad hoc network-- is under serious threat with the ...
Munirul M. Haque, Sheikh Iqbal Ahamed
ICWMC
2006
IEEE
15 years 10 months ago
Power Characterization of a Bluetooth-based Wireless Node for Ubiquitous Computing
Abstract— Ubiquitous computing refers to making many computing devices available throughout the physical environment, while making them effectively invisible to the user. To furt...
Juan-Carlos Cano, José-Manuel Cano, Eva Gon...
MSWIM
2006
ACM
15 years 10 months ago
Multicast in 802.11 WLANs: an experimental study
While the deployment of WiFi networks continue to grow at an explosive rate, the multicast multimedia delivery service on WiFi compliant devices is still in its early stage of dev...
Diego Dujovne, Thierry Turletti
« Prev « First page 1308 / 1466 Last » Next »