Sciweavers

7762 search results - page 105 / 1553
» Availability in BitTorrent Systems
Sort
View
133
Voted
JDM
1998
101views more  JDM 1998»
15 years 3 months ago
Fault-Tolerant Quorum Consensus Scheme for Replication Control in Mobile Distributed Database Systems
We propose a new replication control scheme for multiple-copy consistency in mobile distributed database systems. Replicating data at multiple sites could contribute to enhance th...
Siwoo Byun, Songchun Moon
142
Voted
REALWSN
2010
14 years 10 months ago
K2: A System for Campaign Deployments of Wireless Sensor Networks
Abstract. Environmental scientists frequently engage in "campaignstyle" deployments, where they visit a location for a relatively short period of time (several weeks to m...
Douglas Carlson, Jayant Gupchup, Rob Fatland, Andr...
TSP
2010
14 years 10 months ago
A continuous-time linear system identification method for slowly sampled data
Both direct and indirect methods exist for identifying continuous-time linear systems. A direct method estimates continuous-time input and output signals from their samples and the...
Damián Marelli, Minyue Fu
ICIAR
2005
Springer
15 years 9 months ago
A Step Towards Practical Steganography Systems
There has been many hidden communication techniques proposed in the last few years. The focus was given to steganography to build such techniques. Utilizing stego-key(s) to hide se...
Abdelkader H. Ouda, Mahmoud R. El-Sakka
128
Voted
IEEEAMS
2003
IEEE
15 years 8 months ago
Service Morphing: Integrated System- and Application-Level Service
Service morphing is a set of techniques used to continuously meet an application’s Quality of Service (QoS) needs, in the presence of run-time variations in service locations, p...
Christian Poellabauer, Karsten Schwan, Sandip Agar...