Sciweavers

1660 search results - page 158 / 332
» Forwarding in a content-based network
Sort
View
IPPS
2003
IEEE
15 years 10 months ago
Transparent Query Caching in Peer-to-Peer Overlay Networks
Peer-to-peer (p2p) systems such as Gnutella and KaZaa are routinely used by millions of people for sharing music and many other files over the Internet, and they account for a si...
Sunil Patro, Y. Charlie Hu
PERCOM
2008
ACM
16 years 4 months ago
SGR: A Shared Generic Routing Support for Ad Hoc Ubiquitous Computing Environments
One of the most evident characteristics of an ad hoc ubiquitous computing environment is the dynamism of connections. Due to the mobility of nodes, paths between communicating pee...
Yangwoo Ko, Dongman Lee
PERCOM
2009
ACM
15 years 11 months ago
Randomizing RFID Private Authentication
—Privacy protection is increasingly important during authentications in Radio Frequency Identification (RFID) systems. In order to achieve high-speed authentication in largescale...
Qingsong Yao, Yong Qi, Jinsong Han, Jizhong Zhao, ...
ICDCSW
2008
IEEE
15 years 11 months ago
RETROFIT: Reliable Exchanges through Resilient Overlays for Internet Teleoperation
Emergence of successful teleoperation applications requires the convergence of diverse domains like robotics, machine learning, sensing, actuation, control and communication. We e...
Invited Talk Lakshamanan, Raj Rajkumar
WCNC
2008
IEEE
15 years 11 months ago
Cooperative Communications Using Scalable, Medium Block-length LDPC Codes
Abstract— Cooperative communications has received increasing attention in recent years because of the ubiquity of wireless devices. Each year more mobile computing devices enter ...
Marjan Karkooti, Joseph R. Cavallaro