Sciweavers

3343 search results - page 359 / 669
» Network Objects
Sort
View
186
Voted
VTC
2008
IEEE
185views Communications» more  VTC 2008»
15 years 10 months ago
Opportunistic Spectrum Access for Energy-Constrained Cognitive Radios
This paper considers a scenario in which a secondary user makes opportunistic use of a channel allocated to some primary network. The primary network operates in a time-slotted ma...
Anh Tuan Hoang, Ying-Chang Liang, David Tung Chong...
141
Voted
ICNSC
2007
IEEE
15 years 9 months ago
Queue Length Based Internet Congestion Control
— In this paper we present new queue length based Internet congestion control protocol which is shown through simulations to work effectively. The control objective is to regulat...
Marios Lestas, Andreas Pitsillides, Petros A. Ioan...
AINA
2006
IEEE
15 years 9 months ago
Peer-Tree: A Hybrid Peer-to-Peer Overlay for Service Discovery
Efficient service discovery in dynamic, crossorganizational VO is one of the challenge aspects in ChinaGrid. Network overlay and search algorithms are two important considerations...
Jing Tie, Hai Jin, Shengli Li, Xuanhua Shi, Hanhua...
106
Voted
NDSS
1999
IEEE
15 years 7 months ago
PGRIP: PNNI Global Routing Infrastructure Protection
We describe a system for achieving PNNI (Private Network-Network Interface) Global Routing Infrastructure Protection (PGRIP). We give details of PGRIP's system-level design a...
Sabrina De Capitani di Vimercati, Patrick Lincoln,...
VRML
1998
ACM
15 years 7 months ago
DWTP - An Internet Protocol for Shared Virtual Environments
VRML (the Virtual Reality Modeling Language) has brought 3D objects and virtual worlds to a large number of Internet users. While it provides a suitable basis for the platform ind...
Wolfgang Broll