Sciweavers

828 search results - page 133 / 166
» A Network Coding Approach to Secret Key Distribution
Sort
View
TSMC
2010
14 years 9 months ago
A Biologically Inspired Sensor Wakeup Control Method for Wireless Sensor Networks
-- This paper presents an artificial ant-colony approach to distributed sensor wakeup control in wireless sensor networks (WSN) to accomplish the joint task of surveillance and tar...
Yan Liang, Jiannong Cao, Lei Zhang 0006, Rui Wang,...
MIDDLEWARE
2005
Springer
15 years 8 months ago
Functional and architectural adaptation in pervasive computing environments
Service-oriented computing paradigm encourages the use of dynamic binding of application requirements to the resources needed to fulfill application tasks. Especially in pervasive...
Nanjangud C. Narendra, Umesh Bellur, S. K. Nandy, ...
ICDCS
2000
IEEE
15 years 7 months ago
Highly Concurrent Shared Storage
1 Switched system-area networks enable thousands of storage devices to be shared and directly accessed by end hosts, promising databases and filesystems highly scalable, reliable ...
Khalil Amiri, Garth A. Gibson, Richard A. Golding
149
Voted
ICDCS
2007
IEEE
15 years 6 months ago
Efficient Execution of Continuous Incoherency Bounded Queries over Multi-Source Streaming Data
On-line decision making often involves query processing over time-varying data which arrives in the form of data streams from distributed locations. In such environments typically...
Manish Bhide, Krithi Ramamritham, Mukund Agrawal
131
Voted
SASO
2007
IEEE
15 years 8 months ago
e-SAFE: An Extensible, Secure and Fault Tolerant Storage System
With the rapidly falling price of hardware, and increasingly available bandwidth, the storage technology is seeing a paradigm shift from centralized and managed mode to distribute...
Sandip Agarwala, Arnab Paul, Umakishore Ramachandr...