Sciweavers

1718 search results - page 257 / 344
» Communicating more than nothing
Sort
View
CIG
2005
IEEE
14 years 3 months ago
How to Protect Peer-to-Peer Online Games from Cheats
Abstract- Recently, P2P (peer-to-peer) online game systems have attracted a great deal of public attention. They work without central servers, thus, the maintenance and organizatio...
Haruhiro Yoshimoto, Rie Shigetomi, Hideki Imai
DFT
2005
IEEE
83views VLSI» more  DFT 2005»
14 years 3 months ago
An ILP Formulation for Yield-driven Architectural Synthesis
Data flow graph dominant designs, such as communication video and audio applications, are common in today’s IC industry. In these designs, the datapath resources (e.g., adders,...
Zhaojun Wo, Israel Koren, Maciej J. Ciesielski
DSN
2005
IEEE
14 years 3 months ago
SMRP: Fast Restoration of Multicast Sessions from Persistent Failures
The growing reliance of networked applications on timely and reliable data transfer requires the underlying networking infrastructure to provide adequate services even in the pres...
Jian Wu, Kang G. Shin
MOBIQUITOUS
2005
IEEE
14 years 3 months ago
Multivariate Analysis for Probabilistic WLAN Location Determination Systems
WLAN location determination systems are gaining increasing attention due to the value they add to wireless networks. In this paper, we present a multivariate analysis technique fo...
Moustafa Youssef, Mohamed Abdallah
WONS
2005
IEEE
14 years 3 months ago
Fast Handoff process in Micro Mobile MPLS protocol for Micro-Mobility Management in Next Generation Networks
The rapid growth of wireless networks and services, integrated with the next-generation mobile communication systems, has led to designing efficient handoff protocols to handle m...
Rami Langar, Gwendal Le Grand, Samir Tohmé