Sciweavers

3141 search results - page 536 / 629
» Computing the performability of layered distributed systems ...
Sort
View
SAC
2004
ACM
14 years 2 months ago
Using mobile agents as roaming security guards to test and improve security of hosts and networks
1 This paper discusses the design and implementation details of MAST (Mobile Agent-based Security Tool), a new mobile agentbased network security approach. MAST has been designed t...
Marco M. Carvalho, Thomas B. Cowin, Niranjan Suri,...
MSWIM
2006
ACM
14 years 3 months ago
Pattern matching based link quality prediction in wireless mobile ad hoc networks
As mobile devices, such as laptops, PDAs or mobile phones, are getting more and more ubiquitous and are able to communicate with each other via wireless technologies, the paradigm...
Károly Farkas, Theus Hossmann, Lukas Ruf, B...
MOBIHOC
2007
ACM
14 years 8 months ago
Outlier detection in sensor networks
Outlier detection has many important applications in sensor networks, e.g., abnormal event detection, animal behavior change, etc. It is a difficult problem since global informati...
Bo Sheng, Qun Li, Weizhen Mao, Wen Jin
PDP
2007
IEEE
14 years 3 months ago
An Analytical Model of a BitTorrent Peer
— In the last years peer-to-Peer (P2P) applications are emerging as potentially important structures for information, content management and distribution. The most popular P2P ap...
Mario Barbera, Alfio Lombardo, Giovanni Schembra, ...
FOCS
2002
IEEE
14 years 2 months ago
Minimizing Congestion in General Networks
A principle task in parallel and distributed systems is to reduce the communication load in the interconnection network, as this is usually the major bottleneck for the performanc...
Harald Räcke