Sciweavers

900 search results - page 134 / 180
» Controlling Inbound Traffic
Sort
View
105
Voted
AIPS
1994
15 years 4 months ago
Solving Time-critical Decision-making Problems with Predictable Computational Demands
In this work we present an approach to solving time-critical decision-making problems by taking advantage of domain structure to expand the amountof time available for processing ...
Thomas Dean, Lloyd Greenwald
GLOBECOM
2008
IEEE
15 years 2 months ago
An Efficient Group Key Management for Secure Routing in Ad Hoc Networks
This paper proposes and specifies a protocol for distributing and managing group keys in ad hoc environments, which applies for the Secure Optimized Link State Routing Protocol. Ou...
Natalia Castro Fernandes, Otto Carlos Muniz Bandei...
CN
2008
86views more  CN 2008»
15 years 2 months ago
Enhanced bulk scheduling for supporting delay sensitive streaming applications
Providing end-to-end delay guarantees for delay sensitive applications is an important packet scheduling issue with routers. In this paper, to support end-to-end delay requirement...
Yung-Cheng Tu, Meng Chang Chen, Yeali S. Sun, Wei ...
112
Voted
CORR
2010
Springer
146views Education» more  CORR 2010»
15 years 2 months ago
Modified Bully Algorithm using Election Commission
-- Electing leader is a vital issue not only in distributed computing but also in communication network [1, 2, 3, 4, 5], centralized mutual exclusion algorithm [6, 7], centralized ...
Muhammad Mahbubur Rahman, Afroza Nahar
116
Voted
IJNSEC
2006
88views more  IJNSEC 2006»
15 years 2 months ago
Secure Internet Applications Based on Mobile Agents
The increasing importance of the Internet has motivated the exploration of new execution models based on mobile and dynamic entities to overcome the limits of the client/server mo...
Cungang Yang