Sciweavers

360 search results - page 22 / 72
» Using interaction networks for visualisation of message pass...
Sort
View
76
Voted
DATE
2008
IEEE
69views Hardware» more  DATE 2008»
15 years 6 months ago
Time Properties of the BuST Protocol under the NPA Budget Allocation Scheme
Token passing is a channel access technique used in several communication networks. Among them, one of the most effective solution for supporting both real-time traffic (synchron...
Gianluca Franchino, Giorgio C. Buttazzo, Tullio Fa...
PERCOM
2003
ACM
16 years 14 hour ago
Using Peer-to-Peer Data Routing for Infrastructure-Based Wireless Networks
A mobile ad-hoc network is an autonomous system of mobile routers that are self-organizing and completely decentralized with no requirements for dedicated infrastructure support. ...
Sethuram Balaji Kodeswaran, Olga Ratsimore, Anupam...
95
Voted
INFOCOM
2009
IEEE
15 years 7 months ago
Robust Counting Via Counter Braids: An Error-Resilient Network Measurement Architecture
—A novel counter architecture, called Counter Braids, has recently been proposed for accurate per-flow measurement on high-speed links. Inspired by sparse random graph codes, Co...
Yi Lu, Balaji Prabhakar
CHI
2010
ACM
15 years 7 months ago
Designing a technological playground: a field study of the emergence of play in household messaging
We present findings from a field study of Wayve, a situated messaging device for the home that incorporates handwriting and photography. Wayve was used by 24 households (some of w...
Siân E. Lindley, Richard H. R. Harper, Abiga...
CORR
2010
Springer
146views Education» more  CORR 2010»
15 years 15 days ago
Modified Bully Algorithm using Election Commission
-- Electing leader is a vital issue not only in distributed computing but also in communication network [1, 2, 3, 4, 5], centralized mutual exclusion algorithm [6, 7], centralized ...
Muhammad Mahbubur Rahman, Afroza Nahar