Sciweavers

170 search results - page 19 / 34
» An Efficient Reliable Ring Protocol
Sort
View
CONEXT
2008
ACM
13 years 11 months ago
ALPHA: an adaptive and lightweight protocol for hop-by-hop authentication
Wireless multi-hop networks are particularly susceptible to attacks based on flooding and the interception, tampering with, and forging of packets. Thus, reliable communication in...
Tobias Heer, Stefan Götz, Oscar García...
DAC
2009
ACM
14 years 1 months ago
NUDA: a non-uniform debugging architecture and non-intrusive race detection for many-core
Traditional debug methodologies are limited in their ability to provide debugging support for many-core parallel programming. Synchronization problems or bugs due to race conditio...
Chi-Neng Wen, Shu-Hsuan Chou, Tien-Fu Chen, Alan P...
JSW
2006
98views more  JSW 2006»
13 years 9 months ago
A Jxta Based Asynchronous Peer-to-Peer Implementation of Genetic Programming
Abstract-- Solving complex real-world problems using evolutionary computation is a CPU time-consuming task that requires a large amount of computational resources. Peerto-Peer (P2P...
Gianluigi Folino, Agostino Forestiero, Giandomenic...
IJDSN
2010
147views more  IJDSN 2010»
13 years 4 months ago
Position-Based Aggregator Node Election in Wireless Sensor Networks
In this paper, we introduce PANEL, a position-based aggregator node election protocol for wireless sensor networks. The novelty of PANEL with respect to other aggregator node elec...
Levente Buttyán, Péter Schaffer
IJDSN
2006
146views more  IJDSN 2006»
13 years 9 months ago
Efficient Broadcasting in Self-Organizing Sensor Networks
Multi-hop wireless networks (such as ad-hoc or sensor networks) consist in sets of mobile nodes without the support of a pre-existing fixed infrastructure. For scalability purpose...
Nathalie Mitton, Anthony Busson, Eric Fleury