Sciweavers

2287 search results - page 346 / 458
» Peer data exchange
Sort
View
KIVS
2005
Springer
14 years 2 months ago
Making Chord go mobile
: The Chord protocol is a structured Peer-to-Peer (P2P) protocol based on distributed hash tables (DHT). By using hash keys to identify the nodes in the network and also the shared...
Stefan Zöls, Rüdiger Schollmeier, Wolfga...
SIGMETRICS
2004
ACM
118views Hardware» more  SIGMETRICS 2004»
14 years 2 months ago
Optimizing the quality of scalable video streams on P2P networks
— The volume of multimedia data, including video, served through Peer-to-Peer (P2P) networks is growing rapidly. Unfortunately, high bandwidth transfer rates are rarely available...
Raj Kumar Rajendran, Dan Rubenstein
WS
2004
ACM
14 years 2 months ago
Analysis of the 802.11i 4-way handshake
802.11i is an IEEE standard designed to provide enhanced MAC security in wireless networks. The authentication process involves three entities: the supplicant (wireless device), t...
Changhua He, John C. Mitchell
JCDL
2003
ACM
114views Education» more  JCDL 2003»
14 years 2 months ago
Understanding Educator Perceptions of "Quality" in Digital Libraries
The purpose of the study was to identify educators’ expectations and requirements for the design of educational digital collections for classroom use. A series of five focus gro...
Tamara Sumner, Michael Khoo, Mimi Recker, Mary Mar...
SIGMETRICS
2003
ACM
106views Hardware» more  SIGMETRICS 2003»
14 years 2 months ago
On the effectiveness of movement prediction to reduce energy consumption in wireless communication
—Node movement can be exploited to reduce the energy consumption of wireless network communication. The strategy consists in delaying communication until a mobile node moves clos...
Srijan Chakraborty, David K. Y. Yau, John C. S. Lu...