Sciweavers

1080 search results - page 103 / 216
» Performance analysis of the CONFIDANT protocol
Sort
View
TC
2002
14 years 9 months ago
On Transaction Processing with Partial Validation and Timestamp Ordering in Mobile Broadcast Environments
Conventional concurrency control protocols are inapplicable in mobile broadcast environments due to a number of constraints of wireless communications. Previous studies are focuse...
Victor C. S. Lee, Kwok-Wa Lam, Sang Hyuk Son, Eddi...
CORR
2010
Springer
142views Education» more  CORR 2010»
14 years 10 months ago
The Accuracy of Tree-based Counting in Dynamic Networks
Tree-based protocols are ubiquitous in distributed systems. They are flexible, they perform generally well, and, in static conditions, their analysis is mostly simple. Under churn...
Supriya Krishnamurthy, John Ardelius, Erik Aurell,...
VTC
2008
IEEE
112views Communications» more  VTC 2008»
15 years 4 months ago
Theoretical Analysis of Saturation Throughput in MU-DCF
Abstract—In this paper, the calculation of saturation throughput for previously proposed Multi-User - Distributed Coordination Function (MU-DCF) is presented. MU-DCF is an IEEE 8...
Jelena Mirkovic, Bernhard Walke
CONEXT
2006
ACM
15 years 3 months ago
Neighbor discovery analysis in wireless sensor networks
In wireless sensor networks, hello protocols for neighbor discovery are a basic service offered by the networking stack. However, their study usually rely on rather simplistic mo...
Elyes Ben Hamida, Guillaume Chelius, Eric Fleury
APNOMS
2008
Springer
14 years 12 months ago
Empirical Analysis of Application-Level Traffic Classification Using Supervised Machine Learning
Accurate application traffic classification and identification are important for network monitoring and analysis. The accuracy of traditional Internet application traffic classific...
Byungchul Park, Young J. Won, Mi-Jung Choi, Myung-...