Sciweavers

2478 search results - page 82 / 496
» Message from the Chair
Sort
View
ICC
2007
IEEE
102views Communications» more  ICC 2007»
15 years 10 months ago
A Markov Model for the EpiChord Peer-to-Peer Overlay in an XCAST enabled Network
— Structured Peer to Peer (P2P) overlay networks are becoming increasingly popular. Multi-hop systems achieve a successful lookup in O(log N) hops, whereas one-hop systems approa...
Mario Kolberg, Florence Kolberg, Alan Brown, John ...
NETGAMES
2004
ACM
15 years 9 months ago
A cheat controlled protocol for centralized online multiplayer games
Ordering of command messages from the clients at the game servers is an important issue that impacts fairness, response times, and smoothness of the game play. Recently, protocols...
Bei Di Chen, Muthucumaru Maheswaran
COLING
2008
15 years 5 months ago
Normalizing SMS: are Two Metaphors Better than One ?
Electronic written texts used in computermediated interactions (e-mails, blogs, chats, etc) present major deviations from the norm of the language. This paper presents an comparat...
Catherine Kobus, François Yvon, Géra...
EWCBR
2004
Springer
15 years 9 months ago
Textual Reuse for Email Response
The case-based reasoning approach to email response consists of reusing past messages to synthesize new responses to incoming requests. This task presents various challenges due to...
Luc Lamontagne, Guy Lapalme
DSN
2002
IEEE
15 years 9 months ago
32-Bit Cyclic Redundancy Codes for Internet Applications
Standardized 32-bit Cyclic Redundancy Codes provide fewer bits of guaranteed error detection than they could, achieving a Hamming Distance (HD) of only 4 for maximum-length Ethern...
Philip Koopman