Sciweavers

730 search results - page 132 / 146
» Reflections on network architecture: an active networking pe...
Sort
View
MM
2010
ACM
121views Multimedia» more  MM 2010»
14 years 9 months ago
Implementation and demonstration of a credit-based home access point
The increasing availability of high speed Internet access and the decreasing cost of wireless technologies has increased the number of devices in the home that wirelessly connect ...
Choong-Soo Lee, Mark Claypool, Robert E. Kinicki
MOBICOM
2010
ACM
14 years 9 months ago
CSMA/CN: carrier sense multiple access with collision notification
A wireless transmitter learns of a packet loss, infers collision, only after completing the entire transmission. If the transmitter could detect the collision early (such as with ...
Souvik Sen, Romit Roy Choudhury, Srihari Nelakudit...
103
Voted
ICECCS
2010
IEEE
162views Hardware» more  ICECCS 2010»
14 years 9 months ago
Trust-Based Adaptation in Complex Service-Oriented Systems
Abstract—Complex networks consisting of humans and software services, such as Web-based social and collaborative environments, typically require flexible and context-based inter...
Florian Skopik, Daniel Schall, Schahram Dustdar
VCBM
2010
14 years 4 months ago
Visual Analysis of Integrated Resting State Functional Brain Connectivity and Anatomy
Resting state functional magnetic resonance imaging (rs-fMRI) is an important modality in the study of the functional architecture of the human brain. The correlation between the ...
Andre F. van Dixhoorn, Bastijn H. Vissers, Luca Fe...
PERCOM
2006
ACM
15 years 9 months ago
Exploiting information relationships for access control in pervasive computing
Many information services in pervasive computing offer rich information, which is information that includes other types of information. For example, the information listed in a pe...
Urs Hengartner, Peter Steenkiste