Sciweavers

5324 search results - page 995 / 1065
» Internet Security Protocols
Sort
View
LCN
2006
IEEE
14 years 1 months ago
Computing Real Time Jobs in P2P Networks
— In this paper, we present a distributed computing framework designed to support higher quality of service and fault tolerance for processing deadline-driven tasks in a P2P envi...
Jingnan Yao, Jian Zhou, Laxmi N. Bhuyan
SPAA
2006
ACM
14 years 1 months ago
Packet-mode emulation of output-queued switches
Most common network protocols (e.g., the Internet Protocol) work with variable size packets, whereas contemporary switches still operate with fixed size cells, which are easier t...
Hagit Attiya, David Hay, Isaac Keslassy
WOWMOM
2005
ACM
135views Multimedia» more  WOWMOM 2005»
14 years 1 months ago
Service Discovery in Mobile Ad Hoc Networks: A Field Theoretic Approach
Service discovery in mobile ad hoc networks is challenging because of the absence of any central intelligence in the network. Traditional solutions as used in the Internet are hen...
Vincent Lenders, Martin May, Bernhard Plattner
WOWMOM
2005
ACM
109views Multimedia» more  WOWMOM 2005»
14 years 1 months ago
A High-Throughput MAC Strategy for Next-Generation WLANs
WLAN technology has been shown a revolutionary development during the last decade. Recently popularized IEEE 802.11a/gbased products can support up to 54 Mbps PHY (Physical layer)...
Seongkwan Kim, Youngsoo Kim, Sunghyun Choi, Kyungh...
FTDCS
2003
IEEE
14 years 1 months ago
Resource- and Quality-Aware Application-Level Service Multicast
—Current multimedia application deployment tends to rely on composable service systems, where a complex multimedia service can be composed dynamically from multiple simpler ones ...
Jingwen Jin, Klara Nahrstedt