Sciweavers

3972 search results - page 173 / 795
» Design of the iSCSI Protocol
Sort
View
HICSS
2009
IEEE
146views Biometrics» more  HICSS 2009»
15 years 11 months ago
A Dissemination Protocol to Guarantee Data Accessibility within N-Hops for Wireless Sensor Networks
One of the major challenges of designing a dissemination protocol for Wireless Sensor Networks (WSNs) is energy efficiency. Flooding and SPIN, which are very well-known proactive ...
Moonseong Kim, Matt W. Mutka, Sang-Hun Cho, Hyunse...
SAC
2009
ACM
15 years 11 months ago
A passive conformance testing approach for a MANET routing protocol
In this paper we propose a passive conformance testing technique applied to a Mobile ad hoc network (MANET) routing protocol, OLSR, that is characterized by a dynamically changing...
Ana R. Cavalli, Stéphane Maag, Edgardo Mont...
INFOCOM
2009
IEEE
15 years 11 months ago
Understanding the Performance Gap Between Pull-Based Mesh Streaming Protocols and Fundamental Limits
—Pull-based mesh streaming protocols have recently received much research attention, with successful commercial systems showing their viability in the Internet. Despite the remar...
Chen Feng, Baochun Li, Bo Li
JTRES
2009
ACM
15 years 11 months ago
Avoiding unbounded priority inversion in barrier protocols using gang priority management
Large real-time software systems such as real-time Java virtual machines often use barrier protocols, which work for a dynamically varying number of threads without using centrali...
Harald Röck, Joshua S. Auerbach, Christoph M....
GLOBECOM
2008
IEEE
15 years 11 months ago
MACA-U: A Media Access Protocol for Underwater Acoustic Networks
—Unlike terrestrial wireless communication which uses radio waves, underwater communication relies on acoustic waves. The long latency and limited bandwidth pose great challenges...
Hai-Heng Ng, Wee-Seng Soh, Mehul Motani