Sciweavers

360 search results - page 37 / 72
» Design of an instrument for the evaluation of communication ...
Sort
View
OTM
2005
Springer
14 years 1 months ago
Shelter from the Storm: Building a Safe Archive in a Hostile World
Abstract. The storing of data and configuration files related to scientific experiments is vital if those experiments are to remain reproducible, or if the data is to be shared ...
Jon MacLaren, Gabrielle Allen, Chirag Dekate, Dayo...
IMC
2006
ACM
14 years 1 months ago
Rarest first and choke algorithms are enough
The performance of peer-to-peer file replication comes from its piece and peer selection strategies. Two such strategies have been introduced by the BitTorrent protocol: the rare...
Arnaud Legout, Guillaume Urvoy-Keller, Pietro Mich...
ETFA
2006
IEEE
13 years 11 months ago
Verification of The Minimum Cost Forwarding Protocol for Wireless Sensor Networks
Wireless sensor networks (WSN) consist of small self-contained devices with computational, sensing and wireless communication capabilities. They allow flexible, powerful, tetherles...
William D. Henderson, Steven Tron
PERCOM
2004
ACM
14 years 7 months ago
Escape from the Computer Lab: Education in Mobile Wireless Networks
As mobile wireless network technology becomes widespread, the importance of education about this new form of communication is becoming critical. One of the benefits of mobile comp...
Elizabeth M. Belding-Royer
JSAC
2007
97views more  JSAC 2007»
13 years 7 months ago
R2: Random Push with Random Network Coding in Live Peer-to-Peer Streaming
— In information theory, it has been shown that network coding can effectively improve the throughput of multicast communication sessions in directed acyclic graphs. More practic...
Mea Wang, Baochun Li