Sciweavers

1030 search results - page 101 / 206
» Protocols Using Anonymous Connections: Mobile Applications
Sort
View
ICDCSW
2005
IEEE
15 years 9 months ago
A Sensor-Based Tracking System Using Witnesses
— Search and rescue of people in emergency situations, e.g. lost hikers, stranded climbers, or injured skiers has been difficult due to lack of information about their location ...
Jyh-How Huang, Shivakant Mishra
WWW
2011
ACM
14 years 11 months ago
OntoWiki mobile: knowledge management in your pocket
Abstract. As comparatively powerful mobile computing devices are becoming more common, mobile web applications have started gaining in popularity. In this paper we present an appro...
Timofey Ermilov, Norman Heino, Sören Auer
IPPS
2005
IEEE
15 years 9 months ago
Connection-less TCP
TCP is an important protocol in high-performance computing. It is used extensively in graphics programs and file systems and it is often the protocol used for the cluster control...
Patricia Gilfeather, Arthur B. Maccabe
PERCOM
2003
ACM
16 years 3 months ago
Using Peer-to-Peer Data Routing for Infrastructure-Based Wireless Networks
A mobile ad-hoc network is an autonomous system of mobile routers that are self-organizing and completely decentralized with no requirements for dedicated infrastructure support. ...
Sethuram Balaji Kodeswaran, Olga Ratsimore, Anupam...
MMNS
2001
151views Multimedia» more  MMNS 2001»
15 years 5 months ago
Analysis of Random Access Protocol under Bursty Traffic
Aloha-type random-access protocols have been employed as access control protocols in wireline and wireless, stationary and mobile, multiple-access communications networks. They are...
Jianbo Gao, Izhak Rubin