Sciweavers

258 search results - page 36 / 52
» A Platform for the Implementation of the Services of an Educ...
Sort
View
CORR
2010
Springer
183views Education» more  CORR 2010»
13 years 7 months ago
Forming the COUNCIL Based Clusters in Securing Wireless Ad Hoc Networks
-- In cluster-based routing protocol (CBRP), two-level hierarchical structure is successfully used to reduce over-flooding in wireless ad hoc networks. As it is vulnerable to a sin...
Alok Ojha, Hongmei Deng, Dharma P. Agrawal, Sugata...
GLOBECOM
2007
IEEE
14 years 1 months ago
Discovering Topologies at Router Level: Part II
—Measurement and monitoring of network topologies are essential tasks in current network scenarios. Indeed, due to their utility in planning, management, security, and reliabilit...
Alessio Botta, Walter de Donato, Antonio Pescap&eg...
CORR
2011
Springer
212views Education» more  CORR 2011»
13 years 2 months ago
Analytical Study of Object Components for Distributed and Ubiquitous Computing Environment
: - The Distributed object computing is a paradigm that allows objects to be distributed across a heterogeneous network, and allows each of the components to interoperate as a unif...
Usha Batra, Deepak Dahiya, Sachin Bhardwaj
SOUPS
2009
ACM
14 years 2 months ago
flyByNight: mitigating the privacy risks of social networking
Social networking websites are enormously popular, but they present a number of privacy risks to their users, one of the foremost of which being that social network service provid...
Matthew M. Lucas, Nikita Borisov
CORR
2010
Springer
142views Education» more  CORR 2010»
13 years 2 months ago
On the Benefit of Virtualization: Strategies for Flexible Server Allocation
Abstract--Virtualization technology facilitates a dynamic, demanddriven allocation and migration of servers. This paper studies how the flexibility offered by network virtualizatio...
Dushyant Arora, Anja Feldmann, Gregor Schaffrath, ...