Sciweavers

2642 search results - page 251 / 529
» Merge-by-Wire: Algorithms and System Support
Sort
View
WDAG
2010
Springer
204views Algorithms» more  WDAG 2010»
15 years 2 months ago
The Cost of Privatization
Software transactional memory (STM) guarantees that a transaction, consisting of a sequence of operations on the memory, appears to be executed atomically. In practice, it is impor...
Hagit Attiya, Eshcar Hillel
IJNSEC
2010
152views more  IJNSEC 2010»
14 years 11 months ago
Comparative Analysis of Different Cryptosystems for Hierarchical Mobile IPv6-based Wireless Mesh Network
Wireless Mesh Network (WMN) is advocated as the major supporting technology for the next generation wireless Internet satisfying the needs of anywhere-anytime broadband Internet a...
Ramanarayana Kandikattu, Lillykutty Jacob
WDAG
2010
Springer
196views Algorithms» more  WDAG 2010»
15 years 2 months ago
Brief Announcement: Failure Detectors Encapsulate Fairness
Abstract. We argue that failure detectors encapsulate fairness. Fairness is a measure of the number of steps a process takes relative to another processes and/or messages in transi...
Scott M. Pike, Srikanth Sastry, Jennifer L. Welch
IPSN
2010
Springer
15 years 6 months ago
Adaptive IEEE 802.15.4 protocol for energy efficient, reliable and timely communications
The IEEE 802.15.4 standard for wireless sensor networks can support energy efficient, reliable, and timely packet transmission by tuning the medium access control parameters macMi...
Pan Gun Park, Carlo Fischione, Karl Henrik Johanss...
149
Voted
MM
2006
ACM
93views Multimedia» more  MM 2006»
15 years 10 months ago
Scaling laws and tradeoffs in peer-to-peer live multimedia streaming
It is well-known that live multimedia streaming applications operate more efficiently when organized in peer-to-peer (P2P) topologies, since peer upload capacities are utilized t...
Tara Small, Ben Liang, Baochun Li