• Study Resource
  • Explore Categories
    • Arts & Humanities
    • Business
    • Engineering & Technology
    • Foreign Language
    • History
    • Math
    • Science
    • Social Science

    Top subcategories

    • Advanced Math
    • Algebra
    • Basic Math
    • Calculus
    • Geometry
    • Linear Algebra
    • Pre-Algebra
    • Pre-Calculus
    • Statistics And Probability
    • Trigonometry
    • other →

    Top subcategories

    • Astronomy
    • Astrophysics
    • Biology
    • Chemistry
    • Earth Science
    • Environmental Science
    • Health Science
    • Physics
    • other →

    Top subcategories

    • Anthropology
    • Law
    • Political Science
    • Psychology
    • Sociology
    • other →

    Top subcategories

    • Accounting
    • Economics
    • Finance
    • Management
    • other →

    Top subcategories

    • Aerospace Engineering
    • Bioengineering
    • Chemical Engineering
    • Civil Engineering
    • Computer Science
    • Electrical Engineering
    • Industrial Engineering
    • Mechanical Engineering
    • Web Design
    • other →

    Top subcategories

    • Architecture
    • Communications
    • English
    • Gender Studies
    • Music
    • Performing Arts
    • Philosophy
    • Religious Studies
    • Writing
    • other →

    Top subcategories

    • Ancient History
    • European History
    • US History
    • World History
    • other →

    Top subcategories

    • Croatian
    • Czech
    • Finnish
    • Greek
    • Hindi
    • Japanese
    • Korean
    • Persian
    • Swedish
    • Turkish
    • other →
 
Profile Documents Logout
Upload
Dual prediction-based reporting for object tracking sensor networks
Dual prediction-based reporting for object tracking sensor networks

... When base station doesn't receive new data, it assumes that the object behaved in the predicted manner ...
or “Tipping Point Protocols”
or “Tipping Point Protocols”

Heterogeneity-aware Ad hoc Networking
Heterogeneity-aware Ad hoc Networking

ECE544Lec4-5DR07
ECE544Lec4-5DR07

The University of Sunderland Grid Computer
The University of Sunderland Grid Computer

Developing a formal framework to measure the robustness of networks
Developing a formal framework to measure the robustness of networks

... From experimentally collected data of overlay topology By various random graphs characterized by degree distribution ...
Outline - UF CISE - University of Florida
Outline - UF CISE - University of Florida

...  Need of trust in MANET  Lack of infrastructure leads to the greater possibility of presence of malicious nodes in MANETs.  This becomes a psychological barrier for users in ...
from polyu.edu.hk - Department of Electronic and Information
from polyu.edu.hk - Department of Electronic and Information

Hardware Synthesis
Hardware Synthesis

Routing Indices in P2P Networks
Routing Indices in P2P Networks

... Query Processing in Distributed-Search P2P System In distributed-search P2P system, user submit query together with stop condition (e.g. number of files which needs to be retrieved). Node receives query, search its own database for given query, returns to the user pointer to its results, and, if the ...
Ad-Hoc Routing
Ad-Hoc Routing

... discovering routes to destinations located beyond a node’s routing zone  The Bordercast Resolution Protocol (BRP) allows the node to send messages only to its peripheral nodes ...
powerpoint - People.csail.mit.edu
powerpoint - People.csail.mit.edu

... But, procedures stick around in argument position ...
Centralized P2P systems
Centralized P2P systems

uCast Presentation
uCast Presentation

... Handling Local Minima ...
Presentation
Presentation

IEEE Paper Template in A4 (V1)
IEEE Paper Template in A4 (V1)

Designing Limited-EIRP, Long-distance Links for Water
Designing Limited-EIRP, Long-distance Links for Water

MORA: a movement-based routing algorithm for ad hoc networks
MORA: a movement-based routing algorithm for ad hoc networks

... Reactive routing algorithms, on the other hand, find routes only on demand. Routes are designed when they are needed, in order to minimize the communication overhead. When a node needs to send a message to another node, the sender needs to flood the network in order to find the receiver and determin ...
[slides] Sensor network applications
[slides] Sensor network applications

...  The agent may carry lots of routing information of events even some events have disappeared.  No hints from the paper about the number of agents which should be created from the event zone.  Can the nodes make a query for an event if no such event is existing in the ...
Lightweight Self-organizing Reconfiguration of Opportunistic
Lightweight Self-organizing Reconfiguration of Opportunistic

www2004.org
www2004.org

2013-08 Robust network topologies for replication in CEDA
2013-08 Robust network topologies for replication in CEDA

... It is assumed each node listens on a single port to allow for stream oriented connections initiated by certain peer nodes (typically using TCP). There is a Topology Working Set (TWS) which is replicated over all nodes and contains information about the topology and health of the nodes and the networ ...
Simulating mobile and wireless world using NS
Simulating mobile and wireless world using NS

... ns [new Simulator]  $ns set-address-format hierarchical  $ns node-config -addressType hierarchical ...
PPT
PPT

... Problem: Starting from a node, how do we locate the node responsible for a key, while maintaining as little information ...
PowerPoint - The Exchange Network
PowerPoint - The Exchange Network

... What is the Exchange Network? What are the benefits of the Exchange Network? How do I participate in the Exchange Network? How do I connect my Agency and its data to the Network? What tools and resources are available to simplify my node development ...
< 1 ... 27 28 29 30 31 32 33 34 35 ... 42 >

Kademlia

  • studyres.com © 2025
  • DMCA
  • Privacy
  • Terms
  • Report