Hexagonal mesh and torus, as well as honeycomb and certain other pruned torus networks, are known to belong to the class of Cayley graphs which are node-symmetric and possess othe...
The paper reports the on-going research for applying psycholinguistic resources to building and extending semantic networks. We survey different kinds of information that can be e...
With a better understanding of how probe packets and cross-traffic packets interact with each other, more accurate measurement methods based on active probing can be developed. Sev...
Abstract--The types of lexicons necessary for Transparent Intensional Logic (TIL) logical analysis will be described. We will show the algorithm for analysing the TIL verbal object...
Interconnection architectures range from complete networks, that have a diameter of D = 1 but are impractical except when the number n of nodes is small, to low-cost, minimally co...
The Common Component Architecture (CCA) defines a specification for the implementation of frameworks to support component-based high performance applications. The same framework s...
Madhusudhan Govindaraju, Himanshu Bari, Michael J....
Overlay topologies are now popular with many emerging peer-to-peer (P2P) systems, to efficiently locate and retrieve information. In contrast, the focus of this work is to use ove...
Peer-to-Peer computing is a model consisting of cooperating distributed processing units terms peers. Characteristics of this computing model include lack of centralized control an...
As a key issue in multicast routing with quality of service (QoS) support, constrained minimum Steiner tree (CMST) problem has been a research focus for more than a decade, and ten...
Given the dynamic and harsh environments of electronic textile applications, particularly wearable computers and large-scale sensor networks, fault-tolerance is necessary. The inte...