Sciweavers

1691 search results - page 266 / 339
» The Delayed k-Server Problem
Sort
View
CIKM
2001
Springer
14 years 1 months ago
Caching Constrained Mobile Data
As mobile devices get ubiquitous and grow in computational power, their management of interdependent data also becomes increasingly important. The mobile environment exhibits all ...
Subhasish Mazumdar, Mateusz Pietrzyk, Panos K. Chr...
FSE
2001
Springer
113views Cryptology» more  FSE 2001»
14 years 1 months ago
Optimized Self-Synchronizing Mode of Operation
Abstract. Modes of operation adapt block ciphers to many applications. Among the encryption modes, only CFB Cipher Feedback has both of the following properties: Firstly it allow...
Ammar Alkassar, Alexander Geraldy, Birgit Pfitzman...
ICN
2001
Springer
14 years 1 months ago
QoS Guaranteed Voice Traffic Multiplexing Scheme over VoIP Network Using DiffServ
The current VoIP transfer methods using low bit rate codes such as G.723.1 and G.729 are still very inefficient due to its small payload size in comparison with its large overhead ...
Eun-Ju Ha, Joon-Heup Kwon, Jong-Tae Park
ISRR
2001
Springer
105views Robotics» more  ISRR 2001»
14 years 1 months ago
Towards Robust Data Association and Feature Modeling for Concurrent Mapping and Localization
One of the most challenging aspects of concurrent mapping and localization (CML) is the problem of data association. Because of uncertainty in the origins of sensor measurements, i...
John J. Leonard, Paul M. Newman, Richard J. Rikosk...
NOSSDAV
2001
Springer
14 years 1 months ago
Dimensioning server access bandwidth and multicast routing in overlay networks
Application-level multicast is a new mechanism for enabling multicast in the Internet. Driven by the fast growth of network audio/video streams, application-level multicast has be...
Sherlia Shi, Jonathan S. Turner, Marcel Waldvogel