Sciweavers

7762 search results - page 105 / 1553
» Availability in BitTorrent Systems
Sort
View
JDM
1998
101views more  JDM 1998»
13 years 7 months ago
Fault-Tolerant Quorum Consensus Scheme for Replication Control in Mobile Distributed Database Systems
We propose a new replication control scheme for multiple-copy consistency in mobile distributed database systems. Replicating data at multiple sites could contribute to enhance th...
Siwoo Byun, Songchun Moon
REALWSN
2010
13 years 2 months ago
K2: A System for Campaign Deployments of Wireless Sensor Networks
Abstract. Environmental scientists frequently engage in "campaignstyle" deployments, where they visit a location for a relatively short period of time (several weeks to m...
Douglas Carlson, Jayant Gupchup, Rob Fatland, Andr...
TSP
2010
13 years 2 months ago
A continuous-time linear system identification method for slowly sampled data
Both direct and indirect methods exist for identifying continuous-time linear systems. A direct method estimates continuous-time input and output signals from their samples and the...
Damián Marelli, Minyue Fu
ICIAR
2005
Springer
14 years 1 months ago
A Step Towards Practical Steganography Systems
There has been many hidden communication techniques proposed in the last few years. The focus was given to steganography to build such techniques. Utilizing stego-key(s) to hide se...
Abdelkader H. Ouda, Mahmoud R. El-Sakka
IEEEAMS
2003
IEEE
14 years 1 months ago
Service Morphing: Integrated System- and Application-Level Service
Service morphing is a set of techniques used to continuously meet an application’s Quality of Service (QoS) needs, in the presence of run-time variations in service locations, p...
Christian Poellabauer, Karsten Schwan, Sandip Agar...