Sciweavers

7984 search results - page 1470 / 1597
» Exploring personal information
Sort
View
SENSYS
2003
ACM
14 years 3 months ago
Model-based compression in wireless ad hoc networks
We present a technique for compression of shortest paths routing tables for wireless ad hoc networks. The main characteristic of such networks is that geographic location of nodes...
Milenko Drinic, Darko Kirovski, Miodrag Potkonjak
SENSYS
2003
ACM
14 years 3 months ago
CODA: congestion detection and avoidance in sensor networks
Event-driven sensor networks operate under an idle or light load and then suddenly become active in response to a detected or monitored event. The transport of event impulses is l...
Chieh-Yih Wan, Shane B. Eisenman, Andrew T. Campbe...
SIGMETRICS
2003
ACM
14 years 3 months ago
Queueing systems with long-range dependent input process and subexponential service times
We analyze the asymptotic tail distribution of stationary waiting times and stationary virtual waiting times in a singleserver queue with long-range dependent arrival process and ...
Cathy H. Xia, Zhen Liu
SIGSOFT
2003
ACM
14 years 3 months ago
Modeling and validation of service-oriented architectures: application vs. style
Most applications developed today rely on a given middleware platform which governs the interaction between components, the access to resources, etc. To decide, which platform is ...
Luciano Baresi, Reiko Heckel, Sebastian Thöne...
SPAA
2003
ACM
14 years 3 months ago
The effect of communication costs in solid-state quantum computing architectures
Quantum computation has become an intriguing technology with which to attack difficult problems and to enhance system security. Quantum algorithms, however, have been analyzed un...
Dean Copsey, Mark Oskin, Tzvetan S. Metodi, Freder...
« Prev « First page 1470 / 1597 Last » Next »