Sciweavers

3943 search results - page 740 / 789
» The Personal Computer and Entrepreneurship
Sort
View
SENSYS
2003
ACM
15 years 5 months ago
CODA: congestion detection and avoidance in sensor networks
Event-driven sensor networks operate under an idle or light load and then suddenly become active in response to a detected or monitored event. The transport of event impulses is l...
Chieh-Yih Wan, Shane B. Eisenman, Andrew T. Campbe...
SIGCOMM
2003
ACM
15 years 5 months ago
Towards an accurate AS-level traceroute tool
Traceroute is widely used to detect routing problems, characterize end-to-end paths, and discover the Internet topology. Providing an accurate list of the Autonomous Systems (ASes...
Zhuoqing Morley Mao, Jennifer Rexford, Jia Wang, R...
SIGCOMM
2003
ACM
15 years 5 months ago
Network routing with path vector protocols: theory and applications
Path vector protocols are currently in the limelight, mainly because the inter-domain routing protocol of the Internet, BGP (Border Gateway Protocol), belongs to this class. In th...
João L. Sobrinho
SIGECOM
2003
ACM
97views ECommerce» more  SIGECOM 2003»
15 years 5 months ago
A robust open ascending-price multi-unit auction protocol against false-name bids
This paper presents a new ascending-price multi-unit auction protocol. As far as the authors are aware, this is the first protocol that has an open format, and in which sincere b...
Atsushi Iwasaki, Makoto Yokoo, Kenji Terada
SIGIR
2003
ACM
15 years 5 months ago
Automatic image annotation and retrieval using cross-media relevance models
Libraries have traditionally used manual image annotation for indexing and then later retrieving their image collections. However, manual image annotation is an expensive and labo...
Jiwoon Jeon, Victor Lavrenko, R. Manmatha