Sciweavers

4435 search results - page 794 / 887
» Networking named content
Sort
View
SPC
2005
Springer
14 years 3 months ago
TrustAC: Trust-Based Access Control for Pervasive Devices
Alice first meets Bob in an entertainment shop, then, they wish to share multimedia content, but Do they know what are trustworthy users? How do they share such information in a s...
Florina Almenárez Mendoza, Andrés Ma...
MOBICOM
2004
ACM
14 years 3 months ago
Hybrid rate control for IEEE 802.11
Streaming multimedia content in real-time over a wireless link is a challenging task because of the rapid fluctuations in link conditions that can occur due to movement, interfer...
Ivaylo Haratcherev, Koen Langendoen, Reginald L. L...
SIGIR
2004
ACM
14 years 3 months ago
Bookmark-driven Query Routing in Peer-to-Peer Web Search
: We consider the problem of collaborative Web search and query routing strategies in a peer-to-peer (P2P) environment. In our architecture every peer has a full-fledged search en...
Matthias Bender, Sebastian Michel, Gerhard Weikum,...
WMPI
2004
ACM
14 years 3 months ago
Evaluating kilo-instruction multiprocessors
The ever increasing gap in processor and memory speeds has a very negative impact on performance. One possible solution to overcome this problem is the Kilo-instruction processor. ...
Marco Galluzzi, Ramón Beivide, Valentin Pue...
CSCLP
2004
Springer
14 years 3 months ago
A Value Ordering Heuristic for Local Search in Distributed Resource Allocation
Abstract. In this paper we develop a localized value-ordering heuristic for distributed resource allocation problems. We show how this value ordering heuristics can be used to achi...
Adrian Petcu, Boi Faltings