• Documents
  • Authors
  • Tables
  • Log in
  • Sign up
  • MetaCart
  • DMCA
  • Donate

CiteSeerX logo

Tools

Sorted by:
Try your query at:
Semantic Scholar Scholar Academic
Google Bing DBLP
Results 1 - 10 of 39
Next 10 →

22.10.2009 Implementation of a Peer-to-Peer Multiplayer Game with Realtime Requirements

by Gutachten Alej, Ro Buchmann
"... Massively multiplayer online games (MMOGs) have become increasingly popular in the recent years, particularly in the form of online role-playing games (MMORPGs). These games support up to several ten thousand players interacting in a virtual game world. The current commercially successful games are ..."
Abstract - Add to MetaCart
are client-server based, which is feasible for relatively slow role-playing games. Those have modest bandwidth and latency requirements and are paid for by their customers. For MMOGs with higher realtime requirements and/or a smaller number of customers willing to pay, peer-to-peer networking seems to be a

Continuity and discontinuity of behavioral inhibition and exuberance: Psychophysiological and behavioral influences across the first four years of life.

by Nathan A Fox , Heather A Henderson , Kenneth H Rubin , Susan D Calkins , Louis A Schmidt Fox , N Henderson , H Rubin , K Calkins , S D & Schmidt , L - Child Development, , 2001
"... Abstract: Four-month-old infants were screened (N = 433) for temperamental patterns thought to predict behavioral inhibition, including motor reactivity and the expression of negative affect. Those selected (N = 153) were assessed at multiple age points across the first 4 years of life for behavior ..."
Abstract - Cited by 124 (47 self) - Add to MetaCart
used the term social reticence to reflect behavioral inhibition in social situations. They and their colleagues have conducted detailed observations of children's behaviors during free play, speech-making, and cooperative tasks with unfamiliar peers in order to study social reticence (e.g., A

Applications General Terms

by Huiguang Liang, Ian Tay, Ming Feng Neo, Wei Tsang Ooi , 807
"... We collected mobility traces of 84,208 avatars spanning 22 regions over two months in Second Life, a popular networked virtual environment. We analyzed the traces to characterize the dynamics of the avatars mobility and behavior, both temporally and spatially. We discuss the implications of the our ..."
Abstract - Add to MetaCart
findings to the design of peer-to-peer networked virtual environments, interest management, mobility modeling of avatars, server load balancing and zone partitioning, client-side caching, and prefetching.

1 BonAHA: Service Discovery Framework for Mobile Ad-Hoc Applications

by Suman Srinivasan, Arezu Moghadam, Henning Schulzrinne
"... Abstract—In today’s mobile networks, devices often move from one network to the next, forming transitory associations without a fixed support infrastructure. The state in this network frequently changes due to node transitions, and nodes are always meeting new peers. In this scenario, traditional mo ..."
Abstract - Add to MetaCart
models for writing networking software, such as the client-server model or even the peer-to-peer model, turn out to be unsuitable for writing such “ad-hoc applications”. A new framework needs to be developed for this class of applications to be aware of node transitions as well as metadata (properties

Chapter 2 Overview Of Mobile Communication Systems

by Mobile Radio Communication
"... mobile system, a base station connected to a public network communicates with a mobile unit. This gives the mobile unit access to the public network. More than one mobile at a time can be supported if a different channel (such as a narrow band of spectrum) is assigned to each user. In most systems, ..."
Abstract - Add to MetaCart
will be blocked because all channels are busy. Cellular telephony uses the base/mobile configuration to give mobile users access to the public switched telephone network, as shown in Fig. 2-2 (a). In peer-to-peer systems, mobile Information Source Quantizer/ Source Encoder Channel Encoder Modulator Discrete

Using BubbleStorm Accepted Master-Thesis from Marcel Lucas

by Assessor Prof Alej, Ro P. Buchmann, Ph. D
"... Hiermit versichere ich, die vorliegende Master-Thesis ohne Hilfe Dritter nur mit den angegebenen Quellen und Hilfsmitteln angefertigt zu haben. Alle Stellen, die aus Quellen entnommen wurden, sind als solche kenntlich gemacht. Diese Arbeit hat in gleicher oder ähnlicher Form noch keiner Prüfungsbehö ..."
Abstract - Add to MetaCart
of scalability and maintainability. Hence, different approaches are based on Peer-to-Peer (P2P) technology. In particular, fast-paced NVEs stress these systems and most likely cause high overlay maintenance overhead. This Master’s Thesis presents a novel approach to spatial Publish/Subscribe (Pub/Sub) in P2P

Upgrading Transport Protocols Using Untrusted Mobile Code

by Parveen Patel, Andrew Whitaker, David Wetherall, Jay Lepreau, Tim Stack , 2003
"... In this paper, we present STP, a system in which communicating end hosts use untrusted mobile code to remotely upgrade each other with the transport protocols that they use to communicate. New transport protocols are written in a type-safe version of C, distributed out-of-band, and run in-kernel. Co ..."
Abstract - Cited by 41 (2 self) - Add to MetaCart
In this paper, we present STP, a system in which communicating end hosts use untrusted mobile code to remotely upgrade each other with the transport protocols that they use to communicate. New transport protocols are written in a type-safe version of C, distributed out-of-band, and run in

Risk and protective factors associated with gang involved youth in Trinidad and Tobago

by Charles M. Katz - Pan-American Journal of Public Health , 2010
"... M. Fox1 Objectives. To examine the prevalence of gang involvement, the risk and protective factors associated with gang involvement, and the association between gang involvement and expo-sure to multiple risk and protective factors among school-aged youth in Trinidad and Tobago. Methods. A survey in ..."
Abstract - Cited by 4 (0 self) - Add to MetaCart
instrument was administered to 2 206 students enrolled in 22 high-risk, urban public schools, from March–June 2006. It measured 30 risk factors and 13 protec-tive factors within four domains: community, school, family, and peer-individual, plus levels of alcohol/drug use and delinquency. Results. About 7

Guest Editorial Special Issue on Selected Papers From the

by Gas Sensors, Massood Atashbar
"... 12th IEEE SENSORS Conference 2013 EXPLOSIVE growth in the integration of a variety ofsensors in mobile devices is currently underway and is rapidly dawning into the next revolution in hardware devices. The annually held IEEE SENSORS Conference and the IEEE SENSORS JOURNAL are now established as a pr ..."
Abstract - Add to MetaCart
12th IEEE SENSORS Conference 2013 EXPLOSIVE growth in the integration of a variety ofsensors in mobile devices is currently underway and is rapidly dawning into the next revolution in hardware devices. The annually held IEEE SENSORS Conference and the IEEE SENSORS JOURNAL are now established as a

CMU-CyLab-08-007

by Chia-hsin Chen, Chung-wei Chen, Cynthia Kuo, Yan-hao Lai, Jonathan M. Mccune, Ahren Studer Adrian Perrig , 2008
"... Mobile users share the same expectations as wired users: they want to communicate with other people, they ex-pect the communication to be secure, and it should all be easy. However, mobility poses many challenges for security. Communication is often ad hoc, and the infras-tructure may be untrusted. ..."
Abstract - Add to MetaCart
GS on Nokia N70 camera phones. The first vari-ant, GAnGS-P, is based on an untrusted communication hub. The second variant, GAnGS-T, needs no infrastruc-ture. Both variants use Bluetooth for peer-to-peer wire-less communication during the information exchange. 1
Next 10 →
Results 1 - 10 of 39
Powered by: Apache Solr
  • About CiteSeerX
  • Submit and Index Documents
  • Privacy Policy
  • Help
  • Data
  • Source
  • Contact Us

Developed at and hosted by The College of Information Sciences and Technology

© 2007-2019 The Pennsylvania State University