Sciweavers

1080 search results - page 147 / 216
» Performance analysis of the CONFIDANT protocol
Sort
View
MOBIHOC
2003
ACM
15 years 3 months ago
PAN: providing reliable storage in mobile ad hoc networks with probabilistic quorum systems
Reliable storage of data with concurrent read/write accesses (or query/update) is an ever recurring issue in distributed settings. In mobile ad hoc networks, the problem becomes e...
Jun Luo, Jean-Pierre Hubaux, Patrick Th. Eugster
CSFW
2002
IEEE
15 years 2 months ago
Capturing Parallel Attacks within the Data Independence Framework
We carry forward the work described in our previous papers [3, 14, 12] on the application of data independence to the model checking of cryptographic protocols using CSP [13] and ...
Philippa J. Broadfoot, A. W. Roscoe
CANDC
2009
ACM
15 years 4 months ago
An empirical study of cognition and theatrical improvisation
This paper presents preliminary findings from our empirical study of the cognition employed by performers in improvisational theatre. Our study has been conducted in a laboratory ...
Brian Magerko, Waleed Manzoul, Mark Riedl, Allan B...
ICMCS
2008
IEEE
158views Multimedia» more  ICMCS 2008»
15 years 4 months ago
Video quality assessment and comparative evaluation of peer-to-peer video streaming systems
We design a test methodology to analyze in detail the video quality received at each peer in a peer-to-peer (P2P) video streaming system. The metrics that we employ at each peer i...
Aditya Mavlankar, Pierpaolo Baccichet, Bernd Girod...
IMC
2007
ACM
14 years 11 months ago
Understanding handoffs in large ieee 802.11 wireless networks
As the utility of wireless technology grows, wireless networks are being deployed in more widely varying conditions. The monitoring of these networks continues to reveal key imple...
Ramya Raghavendra, Elizabeth M. Belding, Konstanti...