Sciweavers

758 search results - page 136 / 152
» User Control over User Adaptation: A Case Study
Sort
View
TMC
2008
161views more  TMC 2008»
13 years 7 months ago
A New MAC Scheme Supporting Voice/Data Traffic in Wireless Ad Hoc Networks
Abstract--In wireless ad hoc networks, in addition to the well-known hidden terminal and exposed terminal problems, the locationdependent contention may cause serious unfairness an...
Ping Wang, Hai Jiang, Weihua Zhuang
CLUSTER
2004
IEEE
13 years 7 months ago
A Synchronous Co-Allocation Mechanism for Grid Computing Systems
Grid computing systems are emerging as a computing infrastructure that will enable the use of wide-area network computing systems for a variety of challenging applications. One of ...
Farag Azzedin, Muthucumaru Maheswaran, Neil Arnaso...
NSDI
2010
13 years 9 months ago
Reverse traceroute
Traceroute is the most widely used Internet diagnostic tool today. Network operators use it to help identify routing failures, poor performance, and router misconfigurations. Rese...
Ethan Katz-Bassett, Harsha V. Madhyastha, Vijay Ku...
EDBT
2004
ACM
155views Database» more  EDBT 2004»
14 years 7 months ago
Processing Unions of Conjunctive Queries with Negation under Limited Access Patterns
We study the problem of answering queries over sources with limited access patterns. The problem is to decide whether a given query Q is feasible, i.e., equivalent to an executable...
Alan Nash, Bertram Ludäscher
MATA
2004
Springer
115views Communications» more  MATA 2004»
14 years 1 months ago
AgentViz: A Visualization System for Mobile Agents
Although inexpensive, high performance computer graphics hardware has become commonly available, its application in the mobile agent and networking fields has thus far been limite...
Ken Deeter, Son T. Vuong