Sciweavers

1080 search results - page 163 / 216
» Performance analysis of the CONFIDANT protocol
Sort
View
HICSS
2000
IEEE
136views Biometrics» more  HICSS 2000»
15 years 2 months ago
Ordered End-to-End Multicast for Distributed Multimedia Systems
We address the problem of message ordering for reliable multicast communication. End-to-end multicast ordering is useful for ensuring the collective integrity and consistency of d...
Hans-Peter Dommel, J. J. Garcia-Luna-Aceves
INFOCOM
1997
IEEE
15 years 1 months ago
An Empirical Model of HTTP Network Traffic
The workload of the global Internet is dominated by the Hypertext Transfer Protocol (HTTP), an application protocol used by World Wide Web clients and servers. Simulation studies ...
Bruce A. Mah
MOBIHOC
2004
ACM
15 years 9 months ago
Error characteristics of ad hoc positioning systems (aps)
APS algorithms use the basic idea of distance vector routing to find positions in an ad hoc network using only a fraction of landmarks, for example GPS enabled nodes. All the node...
Dragos Niculescu, Badri Nath
SINOBIOMETRICS
2004
Springer
15 years 3 months ago
Baseline Evaluations on the CAS-PEAL-R1 Face Database
In this paper, three baseline face recognition algorithms are evaluated on the CAS-PEAL-R1 face database which is publicly released from a large-scale Chinese face database: CAS-PE...
Bo Cao, Shiguang Shan, Xiaohua Zhang, Wen Gao
SIGSOFT
2007
ACM
15 years 10 months ago
Programming asynchronous layers with CLARITY
Asynchronous systems components are hard to write, hard to reason about, and (not coincidentally) hard to mechanically verify. In order to achieve high performance, asynchronous c...
Prakash Chandrasekaran, Christopher L. Conway, Jos...