The paper will describe research undertaken to investigate how children can be assisted to construct web based 3D worlds. As new technologies become an increasingly important part ...
Abstract—Hash tables are used in many networking applications, such as lookup and packet classification. But the issue of collisions resolution makes their use slow and not suit...
—P2P (peer-to-peer) technology has proved itself an efficient and cost-effective solution to support large-scale multimedia streaming. Different from traditional P2P application...
—Greedy routing is a novel routing paradigm where messages are always forwarded to the neighbor that is closest to the destination. Our main result is a polynomial-time algorithm...
Roland Flury, Sriram V. Pemmaraju, Roger Wattenhof...
—Experimentation with mobile ad hoc network testbeds is preferred to simulations for performing high fidelity testing. But, at the same time, realistic experimentation with larg...