Sciweavers

1863 search results - page 132 / 373
» Level-Based Link Analysis
Sort
View
GLOBECOM
2007
IEEE
14 years 3 months ago
Exit Policy Violations in Multi-Hop Overlay Routes: Analysis and Mitigation
— The traffic exchanged between two overlay nodes in different autonomous systems (AS) is always subjected to a series of inter-domain policies. However, overlay routing often m...
Srinivasan Seetharaman, Mostafa H. Ammar
GLOBECOM
2006
IEEE
14 years 3 months ago
Mobility Modeling and Handoff Analysis for IP/MPLS-Based Cellular Networks
Abstract— One of the major challenges for the wireless networks is related to efficient mobility management issue. In this paper, we propose a new micro-mobility management sche...
Rami Langar, Nizar Bouabdallah, Samir Tohmé...
DCOSS
2005
Springer
14 years 2 months ago
Analysis of Gradient-Based Routing Protocols in Sensor Networks
Abstract. Every physical event results in a natural information gradient in the proximity of the phenomenon. Moreover, many physical phenomena follow the diffusion laws. This natu...
Jabed Faruque, Konstantinos Psounis, Ahmed Helmy
SIGIR
2004
ACM
14 years 2 months ago
Eye-tracking analysis of user behavior in WWW search
We investigate how users interact with the results page of a WWW search engine using eye-tracking. The goal is to gain into how users browse the presented abstracts and how they s...
Laura A. Granka, Thorsten Joachims, Geri Gay
SIGMETRICS
2004
ACM
106views Hardware» more  SIGMETRICS 2004»
14 years 2 months ago
Performance analysis of BSTs in system software
Binary search tree (BST) based data structures, such as AVL trees, red-black trees, and splay trees, are often used in system software, such as operating system kernels. Choosing ...
Ben Pfaff