Sciweavers

2699 search results - page 481 / 540
» On Evaluating the Performance of Security Protocols
Sort
View
IJCAI
2007
13 years 9 months ago
Communicating Effectively in Resource-Constrained Multi-Agent Systems
Agents with partial observability need to share information to achieve decentralised coordination. However, in resource-constrained systems, indiscriminate communication can creat...
Partha Sarathi Dutta, Claudia V. Goldman, Nicholas...
SIMUTOOLS
2008
13 years 9 months ago
Simulating wireless and mobile networks in OMNeT++ the MiXiM vision
Wireless communication has attracted considerable interest in the research community, and many wireless networks are evaluated using discrete event simulators like OMNeT++. Althou...
A. Köpke, M. Swigulski, K. Wessel, D. Willkom...
WICON
2008
13 years 9 months ago
The impact of link-layer retransmissions on video streaming in wireless mesh networks
Link-layer retransmission is a feature of IEEE 802.11 protocol that aims to increase the reliability of data communications. However, when successive retransmissions fail, retrans...
An Chan, Sung-Ju Lee, Xiaolin Cheng, Sujata Banerj...
RTDB
2001
114views more  RTDB 2001»
13 years 9 months ago
Mobile Distributed Real-Time Database Systems
Research in the concurrency control of real-time data access over mobile networks is receiving growing attention. With possibly lengthy transmission delay and frequent disconnecti...
Kam-yiu Lam, Tei-Wei Kuo
MASCOTS
2003
13 years 9 months ago
Small-World Characteristics of the Internet and Multicast Scaling
Recent work has shown that the physical connectivity of the Internet exhibits small-world behavior. Characterizing such behavior is important not only for generating realistic Int...
Shudong Jin, Azer Bestavros