Sciweavers

4438 search results - page 871 / 888
» On the Distribution of Keys by Hashing
Sort
View
CN
2004
256views more  CN 2004»
13 years 8 months ago
A line in the sand: a wireless sensor network for target detection, classification, and tracking
Intrusion detection is a surveillance problem of practical import that is well suited to wireless sensor networks. In this paper, we study the application of sensor networks to the...
Anish Arora, Prabal Dutta, Sandip Bapat, Vinod Kul...
COMCOM
2004
138views more  COMCOM 2004»
13 years 8 months ago
Issues with inferring Internet topological attributes
A number of recent studies of Internet network structure are based on data collected from inter-domain BGP routing tables and tools, such as traceroute, to probe end-to-end paths....
Lisa Amini, Anees Shaikh, Henning Schulzrinne
CPHYSICS
2004
87views more  CPHYSICS 2004»
13 years 8 months ago
Vlasov simulations on an adaptive phase-space grid
We introduce here a new method for the numerical resolution of the Vlasov equation on a phase space grid using an adaptive semi-Lagrangian method. The adaptivity is obtained throu...
Michael Gutnic, Matthieu Haefele, I. Paun, Eric So...
JSS
2000
123views more  JSS 2000»
13 years 8 months ago
Approaches for broadcasting temporal data in mobile computing systems
Rapid advances in mobile communication technology have spawned many new mobile applications. A key element in many of these systems is the need to distribute real-time information...
Kam-yiu Lam, Edward Chan, Joe Chun-Hung Yuen
MMS
2000
13 years 8 months ago
SMDP: Minimizing Buffer Requirements for Continuous Media Servers
Excessive buffer requirement to handle continuous-media playbacks is an impediment to costeffective provisioning for on-line video retrieval. Given the skewed distribution of video...
Youjip Won, Jaideep Srivastava