Sciweavers

3972 search results - page 206 / 795
» Design of the iSCSI Protocol
Sort
View
147
Voted
CBSE
2005
Springer
15 years 10 months ago
Performance Prediction of J2EE Applications Using Messaging Protocols
Abstract. Predicting the performance of component-based applications is difficult due to the complexity of the underlying component technology. This problem is exacerbated when a m...
Yan Liu, Ian Gorton
143
Voted
SSS
2005
Springer
119views Control Systems» more  SSS 2005»
15 years 10 months ago
Self-stabilization of Byzantine Protocols
Awareness of the need for robustness in distributed systems increases as distributed systems become integral parts of day-to-day systems. Self-stabilizing while tolerating ongoing ...
Ariel Daliot, Danny Dolev
133
Voted
CSCW
2004
ACM
15 years 10 months ago
Beyond "social protocols": multi-user coordination policies for co-located groupware
The status quo for co-located groupware is to assume that “social protocols” (standards of polite behavior) are sufficient to coordinate the actions of a group of users; howev...
Meredith Ringel Morris, Kathy Ryall, Chia Shen, Cl...
AINA
2009
IEEE
15 years 9 months ago
An Analytical Performance Evaluation for WSNs Using Loop-Free Bellman Ford Protocol
—Although several analytical models have been proposed for wireless sensor networks (WSNs) with different capabilities, very few of them consider the effect of general service di...
Mohammad Baharloo, Reza Hajisheykhi, Mohammad Arjo...
149
Voted
ICPADS
2002
IEEE
15 years 9 months ago
The Impact of RTS Threshold on IEEE 802.11 MAC Protocol
Wireless technologies and applications received great attention in recent years. The medium access control (MAC) protocol is the main element that determines the efficiency in sha...
Shiann-Tsong Sheu, Tobias Chen, Jenhui Chen, Fun Y...