Sciweavers

4761 search results - page 798 / 953
» Performance of Protocols
Sort
View
ACMSE
2004
ACM
15 years 9 months ago
Implementing the TEA algorithm on sensors
Sensors are tiny computers with limited computational capability and physical resources. The implementation of secure protocols for sensor network is a big challenge. In order to ...
Shuang Liu, Olga V. Gavrylyako, Phillip G. Bradfor...
116
Voted
PADS
2004
ACM
15 years 9 months ago
The Effect of Detail on Ethernet Simulation
An important question for network simulation is what level of detail is required to obtain a desired level of accuracy. While in some networks, the level of detail is an open rese...
Alefiya Hussain, Aman Kapoor, John S. Heidemann
140
Voted
SC
2004
ACM
15 years 9 months ago
A Self-Organizing Storage Cluster for Parallel Data-Intensive Applications
Cluster-based storage systems are popular for data-intensive applications and it is desirable yet challenging to provide incremental expansion and high availability while achievin...
Hong Tang, Aziz Gulbeden, Jingyu Zhou, William Str...
SIGECOM
2004
ACM
135views ECommerce» more  SIGECOM 2004»
15 years 9 months ago
Applying learning algorithms to preference elicitation
We consider the parallels between the preference elicitation problem in combinatorial auctions and the problem of learning an unknown function from learning theory. We show that l...
Sébastien Lahaie, David C. Parkes
136
Voted
ADAEUROPE
2004
Springer
15 years 9 months ago
PolyORB: A Schizophrenic Middleware to Build Versatile Reliable Distributed Applications
Abstract. The development of real-time distributed applications requires middleware providing both reliability and performance. Middleware must be adaptable to meet application req...
Thomas Vergnaud, Jérôme Hugues, Laure...