Sciweavers

838 search results - page 125 / 168
» Admission control in Peer-to-Peer: design and performance ev...
Sort
View
JCST
2008
144views more  JCST 2008»
13 years 7 months ago
Beacon-Less Geographic Routing in Real Wireless Sensor Networks
Geographic Routing (GR) algorithms, require nodes to periodically transmit HELLO messages to allow neighbors know their positions (beaconing mechanism). Beacon-less routing algorit...
Juan A. Sánchez, Rafael Marín-P&eacu...
PRL
2007
160views more  PRL 2007»
13 years 7 months ago
A 3D face and hand biometric system for robust user-friendly authentication
A complete authentication system based on fusion of 3D face and hand biometrics is presented and evaluated in this paper. The system relies on a low cost real-time sensor, which c...
Filareti Tsalakanidou, Sotiris Malassiotis, Michae...
HPDC
2010
IEEE
13 years 8 months ago
XCo: explicit coordination to prevent network fabric congestion in cloud computing cluster platforms
Large cluster-based cloud computing platforms increasingly use commodity Ethernet technologies, such as Gigabit Ethernet, 10GigE, and Fibre Channel over Ethernet (FCoE), for intra...
Vijay Shankar Rajanna, Smit Shah 0002, Anand Jahag...
MOBICOM
2006
ACM
14 years 1 months ago
IQU: practical queue-based user association management for WLANs
Flash crowds and high concentrations of users in wireless LANs (WLANs) cause significant interference problems and unsustainable load at access points. This leads to poor connect...
Amit P. Jardosh, Kimaya Mittal, Krishna N. Ramacha...
SIGCOMM
2003
ACM
14 years 29 days ago
A measurement-based analysis of multihoming
Multihoming has traditionally been employed by stub networks to enhance the reliability of their network connectivity. With the advent of commercial “intelligent route control...
Aditya Akella, Bruce M. Maggs, Srinivasan Seshan, ...