Sciweavers

3972 search results - page 715 / 795
» Design of the iSCSI Protocol
Sort
View
TWC
2008
156views more  TWC 2008»
13 years 9 months ago
Secure and Fault-Tolerant Event Boundary Detection in Wireless Sensor Networks
Event boundary detection is in and of itself a useful application in wireless sensor networks (WSNs). Typically, it includes the detection of a large-scale spatial phenomenon such ...
Kui Ren, Kai Zeng, Wenjing Lou
CCR
2004
84views more  CCR 2004»
13 years 9 months ago
The state of the email address
Electronic mail is an unquestionably vital component of the Internet infrastructure. While the general perception of email is that it "just works," surprisingly little d...
Mike Afergan, Robert Beverly
CCR
2004
120views more  CCR 2004»
13 years 9 months ago
MAC-layer anycasting in ad hoc networks
A wireless ad hoc network is formed by a group of wireless hosts, without the use of any infrastructure. To enable communication, hosts cooperate among themselves to forward packet...
Romit Roy Choudhury, Nitin H. Vaidya
CN
2004
99views more  CN 2004»
13 years 9 months ago
Broadband communication support for earth observation from the International Space Station
In order to support the communications needs of Earth-observing instruments on the International Space Station (ISS), alternative communications architectures to provide broadband...
Alex T. Nguyen, Michael H. Hadjitheodosiou, John S...
COR
2004
111views more  COR 2004»
13 years 9 months ago
Multiple multicast tree allocation in IP network
The multicasting is defined as the distribution of the same information stream from one to many nodes concurrently. There has been an intensive research effort to design protocols...
Chae Y. Lee, Hee K. Cho