Sciweavers

785 search results - page 115 / 157
» Cache Behavior of Network Protocols
Sort
View
CCIA
2009
Springer
13 years 8 months ago
Interaction, observance or both? Study of the effects on convention emergence
Abstract. Social conventions are useful self-sustaining protocols for groups to coordinate behavior without a centralized entity enforcing coordination. The emergence of such conve...
Daniel Villatoro, Jordi Sabater-Mir, Sandip Sen
SIGCOMM
2010
ACM
13 years 7 months ago
Improving peer-to-peer file distribution: winner doesn't have to take all
Recent work on BitTorrent has shown that the choke/unchoke mechanism implements an auction where each peer tries to induce other peers into "unchoking" it by uploading m...
Ben Leong, Youming Wang, Su Wen, Cristina Carbunar...
CN
2004
94views more  CN 2004»
13 years 7 months ago
A performance study of power-saving polices for Wi-Fi hotspots
Wi-Fi hotspots are one of the most promising scenarios for mobile computing. In this scenario, a very limiting factor is the shortage of energetic resources in mobile devices. Leg...
Giuseppe Anastasi, Marco Conti, Enrico Gregori, An...
EUC
2005
Springer
14 years 1 months ago
Coverage-Aware Sensor Engagement in Dense Sensor Networks
Wireless sensor networks are capable of carrying out surveillance missions for various applications in remote areas without human interventions. An essential issue of sensor netwo...
Jun Lu, Lichun Bao, Tatsuya Suda
ICC
2009
IEEE
115views Communications» more  ICC 2009»
14 years 2 months ago
Peer-to-Peer Application Recognition Based on Signaling Activity
—Because of the enormous growth in the number of peer-to-peer (P2P) applications in recent years, P2P traffic now constitutes a substantial proportion of Internet traffic. The ...
Chen-Chi Wu, Kuan-Ta Chen, Yu-Chun Chang, Chin-Lau...