• Study Resource
  • Explore Categories
    • Arts & Humanities
    • Business
    • Engineering & Technology
    • Foreign Language
    • History
    • Math
    • Science
    • Social Science

    Top subcategories

    • Advanced Math
    • Algebra
    • Basic Math
    • Calculus
    • Geometry
    • Linear Algebra
    • Pre-Algebra
    • Pre-Calculus
    • Statistics And Probability
    • Trigonometry
    • other →

    Top subcategories

    • Astronomy
    • Astrophysics
    • Biology
    • Chemistry
    • Earth Science
    • Environmental Science
    • Health Science
    • Physics
    • other →

    Top subcategories

    • Anthropology
    • Law
    • Political Science
    • Psychology
    • Sociology
    • other →

    Top subcategories

    • Accounting
    • Economics
    • Finance
    • Management
    • other →

    Top subcategories

    • Aerospace Engineering
    • Bioengineering
    • Chemical Engineering
    • Civil Engineering
    • Computer Science
    • Electrical Engineering
    • Industrial Engineering
    • Mechanical Engineering
    • Web Design
    • other →

    Top subcategories

    • Architecture
    • Communications
    • English
    • Gender Studies
    • Music
    • Performing Arts
    • Philosophy
    • Religious Studies
    • Writing
    • other →

    Top subcategories

    • Ancient History
    • European History
    • US History
    • World History
    • other →

    Top subcategories

    • Croatian
    • Czech
    • Finnish
    • Greek
    • Hindi
    • Japanese
    • Korean
    • Persian
    • Swedish
    • Turkish
    • other →
 
Profile Documents Logout
Upload
Energy-Efficient TCP Operation in Wireless Sensor Networks
Energy-Efficient TCP Operation in Wireless Sensor Networks

... IP-based sensor networks may perform spatial IP address assignment that uses the spatial location of the sensor nodes to construct semi-unique IP addresses. Address centric routing. In traditional IP networks, each packet is transparently routed through the network. The routing path is based on the ...
lecture slides - CSE, IIT Bombay
lecture slides - CSE, IIT Bombay

...  Let the current time be t  A node must be old enough for its degree to i t  m 2t k 2 be large; for i(t) > k, we need  Therefore, the fraction (m  t )kof2 nodes with k 2 degree t ...
Scalable Routing Strategies for Ad hoc Wireless Networks
Scalable Routing Strategies for Ad hoc Wireless Networks

... has been computed, it is maintained up to date as long as the source uses it. For example, a link failure may trigger another query/response so that the route is always kept up to date. An alternate scheme for tracing on demand paths (also inspired by LAN bridge routing) is source routing. In this ...
NetComplex: A Complexity Metric for Networked System Designs Byung-Gon Chun Sylvia Ratnasamy
NetComplex: A Complexity Metric for Networked System Designs Byung-Gon Chun Sylvia Ratnasamy

... concrete measurements of the system properties that induce implementation difficulties, complex interactions and failures, and so forth. Many metrics are possible. A perfect metric would be intuitive and easy to calculate, and would correlate with other, more subjective metrics, such as lines of cod ...
Network Working Group S. Blake Request for
Network Working Group S. Blake Request for

... This memo provides information for the Internet community. It does not specify an Internet standard of any kind. Distribution of this memo is unlimited. Copyright Notice Copyright (C) The Internet Society (1998). ...
p2p
p2p

... Anh Le + Tuong Nguyen ...
An Overlay Data Plane for PlanetLab Department of Computer Science Princeton University
An Overlay Data Plane for PlanetLab Department of Computer Science Princeton University

SCI and the Scalable Cluster Architecture Latency-hiding Environment (SCALE) Project
SCI and the Scalable Cluster Architecture Latency-hiding Environment (SCALE) Project

... a vector node within the virtual heterogeneous machine, those that are data parallel in nature might be mapped to a SIMD/SPMD node, etc. The suitability of the tasks must first be evaluated, and only then is load balancing used among selected machines for the final assignment based on these suitabil ...
"The Performance of Query Control Schemes for the Zone Routing Protocol"
"The Performance of Query Control Schemes for the Zone Routing Protocol"

Intel Research Lablet Research Project Proposal Template
Intel Research Lablet Research Project Proposal Template

...  In database terms, the routing table is a view over changing network conditions and state  Maintaining it is the domain of distributed continuous query processing  Not merely an analogy: We have implemented a general routing protocol engine as a query processor. ...
Secure routing for structured peer-to-peer overlay networks
Secure routing for structured peer-to-peer overlay networks

... replication. In Tapestry, neighboring nodes in the namespace are not aware of each other. When a node’s routing table does not have an entry for a node that matches a key’s nth digit, the message is forwarded to the node with the next higher value in the nth digit, modulo 2b , found in the routing t ...
Improving Gnutella - Distributed Computing Group
Improving Gnutella - Distributed Computing Group

... – queries only forwarded if token received -> overloaded nodes stop receiving queries – token proportionally to capacity -> more capacity, more queries can be sent -> more queries from nodes with high capacity - peers not using tokens are marked as inactive ...
Star-crossed cube: an alternative to star graph
Star-crossed cube: an alternative to star graph

HotView Pro Mesh Management Software
HotView Pro Mesh Management Software

PPT
PPT

3rd Edition: Chapter 4
3rd Edition: Chapter 4

...  router knows about physically-connected neighbors  Iterative, distributed computations  “distance vector” algorithms ...
2 - kiv.zcu.cz
2 - kiv.zcu.cz

...  router knows about physically-connected neighbors  Iterative, distributed computations  “distance vector” algorithms ...
SNAP Network Operating System - Synapse forums
SNAP Network Operating System - Synapse forums

... It is easy to write your own scripts to monitor input signals (analog or digital) and control outputs. You can send and receive serial data, or connect to other devices over connections like SPI and I2C. And with your own SNAPpy script in place, the device can be smart enough to know what signals an ...
Variable-Resolution Information Dissemination
Variable-Resolution Information Dissemination

DOMAINS
DOMAINS

Internet Connectivity for Ad hoc Mobile Networks
Internet Connectivity for Ad hoc Mobile Networks

Routing Protocols for Ad
Routing Protocols for Ad

HSR - EPFL
HSR - EPFL

An Approach to Fixed/Mobile Converged Routing
An Approach to Fixed/Mobile Converged Routing

... TDMA technology such as GSM only allows the mobile to be connected to a single BS at a time, with a data path dead-time incurred during handover. To minimize the potential for packet loss while maintaining efficient routing, the inject/poison route features are delayed and invoked only after the Mak ...
PROTOCOLS COMPARISON IN AD HOC NETWORKS
PROTOCOLS COMPARISON IN AD HOC NETWORKS

< 1 2 3 4 5 6 ... 42 >

Kademlia

  • studyres.com © 2025
  • DMCA
  • Privacy
  • Terms
  • Report