Sciweavers

2947 search results - page 520 / 590
» The timely token protocol
Sort
View
IJSNET
2006
129views more  IJSNET 2006»
14 years 12 months ago
Emergency guiding and monitoring applications in indoor 3D environments by wireless sensor networks
Recently, wireless sensor networks have been widely discussed in many applications. In this paper, we propose a novel 3D emergency service that aims to guide people to safe places...
Meng-Shiuan Pan, Chia-Hung Tsai, Yu-Chee Tseng
JNCA
2008
123views more  JNCA 2008»
14 years 12 months ago
Edge-limited scalable QoS flow set-up
Although the Differentiated Services architecture supports scalable packet forwarding based on aggregate flows, the detailed procedure of Quality of Service (QoS) flow set-up with...
James Lembke, Byung Kyu Choi
JNW
2008
129views more  JNW 2008»
14 years 12 months ago
Network-Initiated Terminal Mobility in Voice over 3GPP-WLAN
This paper proposes a network-initiated terminal mobility mechanism (NITM) to facilitate handover with the session initiation protocol (SIP) in 3GPP Voice over WLAN (3GPP VoWLAN). ...
Wei-Kuo Chiang, Hsin-Fu Huang
JCSS
2006
56views more  JCSS 2006»
14 years 12 months ago
Determining model accuracy of network traces
Accurate network modeling is critical to the design of network protocols. Traditional modeling approaches, such as Discrete Time Markov Chains (DTMC) are limited in their ability ...
Almudena Konrad, Ben Y. Zhao, Anthony D. Joseph
JSW
2006
98views more  JSW 2006»
14 years 12 months ago
A Jxta Based Asynchronous Peer-to-Peer Implementation of Genetic Programming
Abstract-- Solving complex real-world problems using evolutionary computation is a CPU time-consuming task that requires a large amount of computational resources. Peerto-Peer (P2P...
Gianluigi Folino, Agostino Forestiero, Giandomenic...