Sciweavers

840 search results - page 51 / 168
» An Interactive Approach to Route Search
Sort
View
COMCOM
1998
102views more  COMCOM 1998»
13 years 8 months ago
Preferred link based delay-constrained least-cost routing in wide area networks
Multimedia applications involving digital audio and/or digital video transmissions require strict QoS constraints (end-to-end delay bound, bandwidth availability, packet loss rate...
R. Sriram, Govindarasu Manimaran, C. Siva Ram Murt...
TPDS
2002
155views more  TPDS 2002»
13 years 8 months ago
Extended Dominating-Set-Based Routing in Ad Hoc Wireless Networks with Unidirectional Links
Efficient routing among a set of mobile hosts (also called nodes) is one of the most important functions in ad hoc wireless networks. Routing based on a connected dominating set is...
Jie Wu
SASO
2009
IEEE
14 years 3 months ago
Self-organized Fault-tolerant Routing in Peer-to-Peer Overlays
—In sufficiently large heterogeneous overlays message loss and delays are likely to occur. This has a significant impact on overlay routing, especially on longer paths. The exi...
Wojciech Galuba, Karl Aberer, Zoran Despotovic, Wo...
CSCWD
2001
Springer
14 years 1 months ago
Verification of XRL: An XML-based Workflow Language
XRL (eXchangeable Routing Language) is an instancebased workflow language that uses XML for the representation of process definitions and Petri nets for its semantics. Since XRL i...
Wil M. P. van der Aalst, H. M. W. Verbeek, A. Kuma...
SDM
2009
SIAM
125views Data Mining» more  SDM 2009»
14 years 6 months ago
Identifying Unsafe Routes for Network-Based Trajectory Privacy.
In this paper, we propose a privacy model that offers trajectory privacy to the requesters of Location-Based Services (LBSs), by utilizing an underlying network of user movement. ...
Aris Gkoulalas-Divanis, Mohamed F. Mokbel, Vassili...