Sciweavers

648 search results - page 65 / 130
» The GCHQ Protocol and Its Problems
Sort
View
ICOIN
2005
Springer
14 years 2 months ago
S-RO: Simple Route Optimization Scheme with NEMO Transparency
Network mobility (NEMO) basic support protocol maintains the connectivity when mobile router (MR) changes its point of attachment to the Internet by establishing a bidirectional tu...
Hanlim Kim, Geunhyung Kim, Cheeha Kim
ISLPED
2003
ACM
138views Hardware» more  ISLPED 2003»
14 years 2 months ago
An environmental energy harvesting framework for sensor networks
Energy constrained systems such as sensor networks can increase their usable lifetimes by extracting energy from their environment. However, environmental energy will typically no...
Aman Kansal, Mani B. Srivastava
AINA
2009
IEEE
14 years 3 months ago
A Simple Distributed ID Assignment Scheme for CSMA/IC Using Well Arranged Rotation ID in Ad Hoc Networks
Carrier Sense Multiple Access / ID Countdown (CSMA/IC) is a collision-free ad hoc MAC protocol. CSMA/IC avoids simultaneous medium access by competing with a local unique ID assig...
Ki-seok Lee, Cheeha Kim
SPAA
2005
ACM
14 years 2 months ago
Dynamic circular work-stealing deque
The non-blocking work-stealing algorithm of Arora, Blumofe, and Plaxton (henceforth ABP work-stealing) is on its way to becoming the multiprocessor load balancing technology of ch...
David Chase, Yossi Lev
WCW
2004
Springer
14 years 2 months ago
Towards Informed Web Content Delivery
Abstract. A wide range of techniques have been proposed, implemented, and even standardized for improving the performance of Web content delivery. However, previous work has found ...
Leeann Bent, Michael Rabinovich, Geoffrey M. Voelk...