• Study Resource
  • Explore Categories
    • Arts & Humanities
    • Business
    • Engineering & Technology
    • Foreign Language
    • History
    • Math
    • Science
    • Social Science

    Top subcategories

    • Advanced Math
    • Algebra
    • Basic Math
    • Calculus
    • Geometry
    • Linear Algebra
    • Pre-Algebra
    • Pre-Calculus
    • Statistics And Probability
    • Trigonometry
    • other →

    Top subcategories

    • Astronomy
    • Astrophysics
    • Biology
    • Chemistry
    • Earth Science
    • Environmental Science
    • Health Science
    • Physics
    • other →

    Top subcategories

    • Anthropology
    • Law
    • Political Science
    • Psychology
    • Sociology
    • other →

    Top subcategories

    • Accounting
    • Economics
    • Finance
    • Management
    • other →

    Top subcategories

    • Aerospace Engineering
    • Bioengineering
    • Chemical Engineering
    • Civil Engineering
    • Computer Science
    • Electrical Engineering
    • Industrial Engineering
    • Mechanical Engineering
    • Web Design
    • other →

    Top subcategories

    • Architecture
    • Communications
    • English
    • Gender Studies
    • Music
    • Performing Arts
    • Philosophy
    • Religious Studies
    • Writing
    • other →

    Top subcategories

    • Ancient History
    • European History
    • US History
    • World History
    • other →

    Top subcategories

    • Croatian
    • Czech
    • Finnish
    • Greek
    • Hindi
    • Japanese
    • Korean
    • Persian
    • Swedish
    • Turkish
    • other →
 
Profile Documents Logout
Upload
Issues of Interconnection Networks
Issues of Interconnection Networks

... Burkhard Monien (University of Paderborn) Howard Jay Siegel (Purdue University) Tom Stern (Columbia University) ...
Intel Labs Presentation Template
Intel Labs Presentation Template

Reliable Localization Algorithms Using RSS
Reliable Localization Algorithms Using RSS

Routing
Routing

... l((i, j): the non-negative cost associated with the edge between nodes i, j N and l(i, j) =  if no edge connects i and j Let s N be the starting node which executes the algorithm to find shortest paths to all other nodes in N Two variables used by the algorithm ...
MCA2 - aes journals
MCA2 - aes journals

tools_tutorial_ver00..
tools_tutorial_ver00..

...  Skeptic’s view: Nothing new, just distributed computing “rediscovered” or made fashionable.  Reality: Distributed computing on a large scale  No longer limited to a single LAN or a single domain.  Autonomous nodes, no controlling/managing authority.  Heterogeneous nodes intermittently connecte ...
Intel Labs Presentation Template
Intel Labs Presentation Template

Design and performance analysis of distributed
Design and performance analysis of distributed

A Context-Aware Cross-Layer Broadcast Model
A Context-Aware Cross-Layer Broadcast Model

Session_14
Session_14

Distributed Computing in Peer-to-peer Networks Emir Ahmetspahi´ c
Distributed Computing in Peer-to-peer Networks Emir Ahmetspahi´ c

ppt
ppt

Maintaining High Bandwidth under Dynamic Network Conditions
Maintaining High Bandwidth under Dynamic Network Conditions

Describe number and configuration of disks on
Describe number and configuration of disks on

... goes down a cloud will survive with half its normal network bandwidth still available for the affected nodes. Another low-level hardware feature that provides redundancy is RAID1 for disks on Infrastructure and Storage nodes to keep an operating system intact in case of a disk failure. Also it’s hig ...
paper
paper

MANETconf: Configuration of Hosts in a Mobile Ad Hoc Network.
MANETconf: Configuration of Hosts in a Mobile Ad Hoc Network.

... allocation is made permanent by a second message which is sent by the initiator if the initiator receives an affirmative response from all nodes in the network. So, IP address allocation is similar to two-phase commit. Nodes which no longer wish to be a part of the system relinquish their address by ...
Signature based Intrusion Detection for Wireless Ad
Signature based Intrusion Detection for Wireless Ad

event storage node
event storage node

IOSR Journal of Electronics and Communication Engineering (IOSR-JECE)
IOSR Journal of Electronics and Communication Engineering (IOSR-JECE)

Abstract - PG Embedded systems
Abstract - PG Embedded systems

... to the members of a multicast group with an acceptable quality of service (QoS) [2], [3]. QoS is the performance level of a service offered by the network, in general [1]. Specifically, QoS in voice communications necessitates 1) maintaining a high enough packet delivery ratio (PDR), 2) keeping the ...
Lecture 12 - Personal Web Pages - University of North Carolina at
Lecture 12 - Personal Web Pages - University of North Carolina at

... • iterative process of computation, exchange of info with neighbors • “distance vector” algorithms ...
Peer-to-peer networking with BitTorrent - UCLA
Peer-to-peer networking with BitTorrent - UCLA

... SHDSL and similar, but the main majority of users have asymmetric rates and this is highly likely to continue in the near future. This implies that one-to-one file sharing is not the optimal solution. It is, however, the way traditional file sharing protocols (like KaZaa) work. Bram Cohen managed th ...
DNS Load Balancing and Failover Mechanism at
DNS Load Balancing and Failover Mechanism at

I.Research of Underwater Wireless Sensor Network
I.Research of Underwater Wireless Sensor Network

IOSR Journal of Electronics and Communication Engineering (IOSR-JECE)
IOSR Journal of Electronics and Communication Engineering (IOSR-JECE)

... To achieve the objective of quality of service in wireless network, various resource control operations were developed in past. Whereas in heterogeneous network each node is offered with a dynamic forwarding rate, resource scheduler were used to control the available resources. The goal for a packet ...
< 1 ... 5 6 7 8 9 10 11 12 13 ... 42 >

Kademlia

  • studyres.com © 2025
  • DMCA
  • Privacy
  • Terms
  • Report