Sciweavers

3810 search results - page 724 / 762
» Using mobile agents for network performance management
Sort
View
TPDS
2008
116views more  TPDS 2008»
13 years 7 months ago
Pseudo Trust: Zero-Knowledge Authentication in Anonymous P2Ps
Most trust models in Peer-to-Peer (P2P) systems are identity based, which means that in order for one peer to trust another, it needs to know the other peer's identity. Hence,...
Li Lu, Jinsong Han, Yunhao Liu, Lei Hu, Jinpeng Hu...
PDCN
2004
13 years 9 months ago
Quality-of-service provisioning system for multimedia transmission in IEEE 802.11 wireless lans
IEEE 802.11, the standard of wireless local area networks (WLANs), allows the coexistence of asynchronous and time-bounded traffic using the distributed coordination function (DCF)...
Joseph Deng, Hsu-Chun Yen
VTC
2010
IEEE
207views Communications» more  VTC 2010»
13 years 6 months ago
The Design and Implementation of IEEE 802.21 and Its Application on Wireless VoIP
—Supporting a multimode mobile device to seamlessly switch its connections between various wireless access networks, such as WiMAX, Wi-Fi, and LTE, is an important research issue...
Tein-Yaw Chung, Yung-Mu Chen, Pu-Chen Mao, Chen-Ku...
MICRO
1997
IEEE
86views Hardware» more  MICRO 1997»
13 years 12 months ago
Streamlining Inter-Operation Memory Communication via Data Dependence Prediction
We revisit memory hierarchy design viewing memory as an inter-operation communication agent. This perspective leads to the development of novel methods of performing inter-operati...
Andreas Moshovos, Gurindar S. Sohi
DFG
2007
Springer
14 years 1 months ago
PointCloudXplore 2: Visual Exploration of 3D Gene Expression
: To better understand how developmental regulatory networks are defined in the genome sequence, the Berkeley Drosophila Transcription Network Project (BDNTP) has developed a suit...
Oliver Rübel, Gunther H. Weber, Min-Yu Huang,...