Sciweavers

8322 search results - page 34 / 1665
» What Are We Looking for
Sort
View
PAM
2010
Springer
14 years 2 months ago
Yes, We LEDBAT: Playing with the New BitTorrent Congestion Control Algorithm
Since December 2008, the official BitTorrent client is using a new congestion-control protocol for data transfer, implemented at the application layer and built over UDP at the tr...
Dario Rossi, Claudio Testa, Silvio Valenti
ICC
2009
IEEE
148views Communications» more  ICC 2009»
14 years 2 months ago
Analysis of Probabilistic Flooding: How Do We Choose the Right Coin?
Abstract—This paper studies probabilistic information dissemination in random networks. Consider the following scenario: A node intends to deliver a message to all other nodes in...
Sérgio Crisóstomo, Udo Schilcher, Ch...
COMAD
2008
13 years 9 months ago
Information Integration Across Heterogeneous Sources: Where Do We Stand and How to Proceed?
Today, information integration has assumed a completely different, complex connotation than what it used to be. The advent of the Internet, the proliferation of information source...
Aditya Telang, Sharma Chakravarthy, Yan Huang
CTW
2002
91views more  CTW 2002»
13 years 7 months ago
Can We Ever Escape from Data Overload? A Cognitive Systems Diagnosis
ive. This characterization leads to model-based abstractions and representation design techniques as potential solutions. Many of the existing approaches to coping with data overlo...
David D. Woods, Emily S. Patterson, Emilie M. Roth
DAC
2003
ACM
14 years 24 days ago
4G terminals: how are we going to design them?
Fourth-generation wireless communication systems (4G) will have totally different requirements than what front-end designers have been coping with up to now. Designs must be targe...
Jan Craninckx, Stéphane Donnay