Sciweavers

2047 search results - page 90 / 410
» Pervasive Computing on Active Networks
Sort
View
72
Voted
PODC
1997
ACM
15 years 3 months ago
Computing Vector Functions on Anonymous Networks
In an anonymous network processors have no distinct identifiers. For any class of anonymous networks, we characterize effectively the vector functions f : n → n which are compu...
Paolo Boldi, Sebastiano Vigna
89
Voted
E2EMON
2006
IEEE
15 years 5 months ago
An Analysis of Active End-to-end Bandwidth Measurements in Wireless Networks
— For active, probing-based bandwidth measurements performed on top of the unifying IP layer, it may seem reasonable to expect the measurement problem in wireless networks to be ...
Andreas Johnsson, Mats Björkman, Bob Melander
115
Voted
PERVASIVE
2011
Springer
14 years 1 months ago
Planning, Apps, and the High-End Smartphone: Exploring the Landscape of Modern Cross-Device Reaccess
The rapid growth of mobile devices has made it challenging for users to maintain a consistent digital history among all their personal devices. Even with a variety of cloud computi...
Elizabeth Bales, Timothy Sohn, Vidya Setlur
WDAG
2001
Springer
76views Algorithms» more  WDAG 2001»
15 years 3 months ago
An Effective Characterization of Computability in Anonymous Networks
We provide effective (i.e., recursive) characterizations of the relations that can be computed on networks where all processors use the same algorithm, start from the same state, a...
Paolo Boldi, Sebastiano Vigna
86
Voted
PODC
1999
ACM
15 years 3 months ago
Computing Anonymously with Arbitrary Knowledge
We provide characterizations of the relations that can be computed with arbitrary knowledge on networks where all processors use the same algorithm and start from the same state (...
Paolo Boldi, Sebastiano Vigna