Sciweavers

7504 search results - page 1432 / 1501
» Computing with Action Potentials
Sort
View
116
Voted
LCN
2006
IEEE
15 years 8 months ago
On Access Point Selection in IEEE 802.11 Wireless Local Area Networks
In wireless local area networks often a station can potentially associate with more than one access point. Therefore, a relevant question is which access point to select “best...
Murad Abusubaih, James Gross, Sven Wiethölter...
P2P
2006
IEEE
121views Communications» more  P2P 2006»
15 years 8 months ago
The Orchard Algorithm: P2P Multicasting without Free-Riding
The main purpose of many current peer-to-peer (P2P) networks is off-line file sharing. However, a potentially very promising use of such networks is to share video streams (e.g.,...
Jan-David Mol, Dick H. J. Epema, Henk J. Sips
129
Voted
SRDS
2006
IEEE
15 years 8 months ago
Solving Consensus Using Structural Failure Models
Failure models characterise the expected component failures in fault-tolerant computing. In the context of distributed systems, a failure model usually consists of two parts: a fu...
Timo Warns, Felix C. Freiling, Wilhelm Hasselbring
TRIDENTCOM
2006
IEEE
15 years 8 months ago
The utility of perceptive communication between distant wireless nodes
CSMA-based MAC protocols require wireless nodes to share the transmission medium with other nodes that are within carriersensing (CS) range. Hence, operations that depend on and c...
Kimaya Sanzgiri, Ian D. Chakeres, Elizabeth M. Bel...
ASSETS
2006
ACM
15 years 8 months ago
MobileASL: : intelligibility of sign language video as constrained by mobile phone technology
For Deaf people, access to the mobile telephone network in the United States is currently limited to text messaging, forcing communication in English as opposed to American Sign L...
Anna Cavender, Richard E. Ladner, Eve A. Riskin
« Prev « First page 1432 / 1501 Last » Next »