Sciweavers

785 search results - page 151 / 157
» Cache Behavior of Network Protocols
Sort
View
IJWIS
2006
126views more  IJWIS 2006»
13 years 7 months ago
Web services on embedded devices
Abstract-- The capabilities of embedded devices such as smartphones are steadily increasing and provide the great flexibility of data access and collaboration while being mobile. F...
Daniel Schall, Marco Aiello, Schahram Dustdar
CCR
2004
84views more  CCR 2004»
13 years 7 months ago
The state of the email address
Electronic mail is an unquestionably vital component of the Internet infrastructure. While the general perception of email is that it "just works," surprisingly little d...
Mike Afergan, Robert Beverly
CCR
2004
151views more  CCR 2004»
13 years 7 months ago
Practical verification techniques for wide-area routing
Protocol and system designers use verification techniques to analyze a system's correctness properties. Network operators need verification techniques to ensure the "cor...
Nick Feamster
TC
2002
13 years 7 months ago
Support for Recovery in Mobile Systems
Abstract--Mobile systems increasingly are being used for production-grade datacentered applications which require system support for transactional properties. For mobile applicatio...
Cris Pedregal Martin, Krithi Ramamritham
INFOCOM
2010
IEEE
13 years 6 months ago
Recognizing Exponential Inter-Contact Time in VANETs
—Inter-contact time between moving vehicles is one of the key metrics in vehicular ad hoc networks (VANETs) and central to forwarding algorithms and the end-to-end delay. Due to ...
Hongzi Zhu, Luoyi Fu, Guangtao Xue, Yanmin Zhu, Mi...