Sciweavers

2947 search results - page 108 / 590
» The timely token protocol
Sort
View
ICN
2005
Springer
15 years 10 months ago
AIMD Penalty Shaper to Enforce Assured Service for TCP Flows
Abstract. Many studies explored the guaranteed TCP throughput problem in DiffServ networks. Several new marking schemes have been proposed in order to solve this problem. Even if ...
Emmanuel Lochin, Pascal Anelli, Serge Fdida
139
Voted
ACSC
2002
IEEE
15 years 9 months ago
Signature Extraction for Overlap Detection in Documents
Easy access to the Web has led to increased potential for students cheating on assignments by plagiarising others’ work. By the same token, Web-based tools offer the potential f...
Raphael A. Finkel, Arkady B. Zaslavsky, Kriszti&aa...
130
Voted
DATE
2010
IEEE
148views Hardware» more  DATE 2010»
15 years 9 months ago
Scoped identifiers for efficient bit aligned logging
Abstract--Detailed diagnostic data is a prerequisite for debugging problems and understanding runtime performance in distributed wireless embedded systems. Severe bandwidth limitat...
Roy Shea, Mani B. Srivastava, Young Cho
146
Voted
ICMCS
1999
IEEE
131views Multimedia» more  ICMCS 1999»
15 years 9 months ago
Integrating Web Resources and Lexicons into a Natural Language Query System
The START system responds to natural language queries with answers in text, pictures, and other media. START's sentence-level natural language parsing relies on a number of m...
Boris Katz, Deniz Yuret, Jimmy J. Lin, Sue Felshin...
APN
2006
Springer
15 years 8 months ago
Nested Nets for Adaptive Systems
We consider nested nets, i.e. Petri nets in which tokens can be Petri nets themselves. We study value semantics of nested nets rather than reference semantics, and apply nested ne...
Kees M. van Hee, Irina A. Lomazova, Olivia Oanea, ...