Sciweavers

2214 search results - page 119 / 443
» Dynamic Protocol Recovery
Sort
View
RIVF
2008
13 years 11 months ago
Robust overlay network with Self-Adaptive topology: Protocol description
We introduce a new overlay network named ROSA1 . Overlay networks offer a way to bypass the routing constraints of the underlying network. ROSA used this overlay network property t...
Loic Baud, Nguyen Pham, Patrick Bellot
CCIA
2009
Springer
13 years 11 months ago
2-LAMA Architecture vs. BitTorrent Protocol in a Peer-to-Peer Scenario
Abstract. In this paper, we review our Multi-Agent System (MAS) architecture (2LAMA) proposed to assist existing MAS. This architecture consists of two levels: the conventional MAS...
Jordi Campos Miralles, Maite López-Sá...
IJAHUC
2007
99views more  IJAHUC 2007»
13 years 10 months ago
Simulation study of some PRMA-based protocols with channel reservation for data traffic
: Medium Access Control (MAC) and resource allocation are two challenging issues in mobile network. Packet reservation multiple access (PRMA) is considered as a promising MAC proto...
Xue Jun Li, Peter Han Joo Chong
SIGMETRICS
2008
ACM
13 years 10 months ago
A view-probability-matrix approach to the modelling of gossiping protocols
This paper addresses the quantitative analysis of gossiping protocols. In contrast to existing approaches which are entirely based on the simulation of the individual nodes' ...
Thomas Krieger, Martin Riedl, Johann Schuster, Mar...
ICIP
2010
IEEE
13 years 8 months ago
Auction protocol for camera active control
In this paper, we apply the auction-based theories in economics to camera networks. We develop a set of auction protocols to do camera active control (pan/tilt/zoom) intelligently...
Yiming Li, Bir Bhanu, Wei Lin