Sciweavers

819 search results - page 119 / 164
» User-controlled link adaptation
Sort
View
ICPPW
2005
IEEE
15 years 3 months ago
A New Multipath Routing Approach to Enhancing TCP Security in Ad Hoc Wireless Networks
— In a typical mobile ad hoc network, mobile computing devices wander autonomously and communicate via temporary links in a self-organized computing system without any central ad...
Zhi Li, Yu-Kwong Kwok
IPPS
2005
IEEE
15 years 3 months ago
Message Passing for Linux Clusters with Gigabit Ethernet Mesh Connections
Multiple copper-based commodity Gigabit Ethernet (GigE) interconnects (adapters) on a single host can lead to Linux clusters with mesh/torus connections without using expensive sw...
Jie Chen, William A. Watson III, Robert Edwards, W...
WONS
2005
IEEE
15 years 3 months ago
Broadcasting in Hybrid Ad Hoc Networks
In this paper, we consider hybrid ad hoc networks, which are composed of two kinds of nodes, regular ones and nodes with additional capabilities. For example, multi-hop cellular a...
François Ingelrest, David Simplot-Ryl, Ivan...
HT
2005
ACM
15 years 3 months ago
Mind the semantic gap
Hypertext can be seen as a logic representation, where semantics are encoded in both the textual nodes and the graph of links. Systems that have a very formal representation of th...
David E. Millard, Nicholas Gibbins, Danius T. Mich...
MM
2005
ACM
179views Multimedia» more  MM 2005»
15 years 3 months ago
rStream: resilient peer-to-peer streaming with rateless codes
The inherent instability and unreliability of peer-to-peer networks introduce several fundamental engineering challenges to multimedia streaming over peer-to-peer networks. First,...
Chuan Wu, Baochun Li