Sciweavers

606 search results - page 98 / 122
» Algebras and Update Strategies
Sort
View
ISCIS
2004
Springer
14 years 1 months ago
Multicast Routing for Ad Hoc Networks with a Multiclass Scheme for Quality of Service
As multimedia- and group-oriented computing becomes increasingly popular for the users of wireless mobile networks, the importance of features like quality of service (QoS) and mul...
Kaan Bür, Cem Ersoy
IWMM
2004
Springer
82views Hardware» more  IWMM 2004»
14 years 1 months ago
Write barrier elision for concurrent garbage collectors
Concurrent garbage collectors require write barriers to preserve consistency, but these barriers impose significant direct and indirect costs. While there has been a lot of work ...
Martin T. Vechev, David F. Bacon
MWCN
2004
Springer
14 years 1 months ago
Collaboration Enforcement and Adaptive Data Redirection in Mobile Ad Hoc Networks Using Only First-Hand Experience
: In Mobile Ad Hoc Networks (MANETs), all participating hosts are obligated to route and forward data for others to guarantee the availability of network applications and services....
Ning Jiang, Kien A. Hua, Mounir A. Tantaoui
MWCN
2004
Springer
14 years 1 months ago
Cluster-Based Location-Services for Scalable Ad Hoc Network Routing
: We propose a location-service to assist location-based routing protocols, realised through our Associativity-Based Clustering protocol. The main goal of our scheme, which employs...
Sivapathalingham Sivavakeesar, George Pavlou
PAKDD
2004
ACM
100views Data Mining» more  PAKDD 2004»
14 years 1 months ago
Using Self-Consistent Naive-Bayes to Detect Masquerades
To gain access to account privileges, an intruder masquerades as the proper account user. This paper proposes a new strategy for detecting masquerades in a multiuser system. To det...
Kwong H. Yung