Sciweavers

1692 search results - page 258 / 339
» A Dynamic Network Interdiction Problem
Sort
View
143
Voted
AINA
2004
IEEE
15 years 6 months ago
An Efficient Clustered Architecture for P2P Networks
Peer-to-peer (P2P) computing offers many attractive features, such as self-organization, load-balancing, availability, fault tolerance, and anonymity. However, it also faces some ...
Juan Li, Son T. Vuong
128
Voted
ADHOC
2007
71views more  ADHOC 2007»
15 years 2 months ago
Service capacity in vehicular networks: A resource dissemination analysis
The support of peer-to-peer (P2P) resource sharing in dynamic scenarios is one of the most challenging research fields for both its expected commercial and technological impact o...
Laura Galluccio, Alessandro Leonardi, Antonio Mate...
JIPS
2006
126views more  JIPS 2006»
15 years 2 months ago
TASL: A Traffic-Adapted Sleep/Listening MAC Protocol for Wireless Sensor Network
In this paper, we proposed a MAC protocol, which can dynamically adjust Listening/Sleeping time rate of wireless sensor nodes according to data traffic load. In sensor networks, se...
Yuan Yang, Zhen Fu, Tae-Seok Lee, Myong-Soon Park
141
Voted
TKDE
2010
152views more  TKDE 2010»
15 years 29 days ago
Maintaining Recursive Views of Regions and Connectivity in Networks
— The data management community has recently begun to consider declarative network routing and distributed acquisition: e.g., sensor networks that execute queries about contiguou...
Mengmeng Liu, Nicholas E. Taylor, Wenchao Zhou, Za...
115
Voted
IPPS
2005
IEEE
15 years 8 months ago
On the Optimal Placement of Secure Data Objects over Internet
Secret sharing algorithms have been used for intrusion tolerance, which ensure the confidentiality, integrity and availability of critical information. However, dynamically changi...
Manghui Tu, Peng Li, Qingkai Ma, I-Ling Yen, Farok...