Sciweavers

1537 search results - page 263 / 308
» Deployment of Distributed Multi-agent Systems
Sort
View
IPM
2008
88views more  IPM 2008»
13 years 7 months ago
Remembering William Goffman: Mathematical information science pioneer
This paper reviews the career and legacy of William (Bill) Goffman, who served as a researcher, Professor, Dean and Emeritus at Case Western Reserve University, Cleveland, Ohio, f...
Glynn Harmon
JSAC
2007
128views more  JSAC 2007»
13 years 7 months ago
Location-Aware Services over Vehicular Ad-Hoc Networks using Car-to-Car Communication
Abstract— Recent advances in wireless inter-vehicle communication systems enable the establishment of Vehicular Ad-hoc Networks (VANET) and create significant opportunities for ...
Marios D. Dikaiakos, Andreas Florides, Tamer Nadee...
CCR
2002
98views more  CCR 2002»
13 years 7 months ago
Efficient flooding with Passive Clustering (PC) in ad hoc networks
An ad hoc network is a fast deployable selfconfiguring wireless network characterized by node mobility, dynamic topology structure, unreliable media and limited power supply. Node...
Taek Jin Kwon, Mario Gerla
ICC
2011
IEEE
206views Communications» more  ICC 2011»
12 years 7 months ago
Unveiling the Content-Centric Features of TCP
—Content-centric networking has been proposed as a new networking paradigm that is centered around the distribution of content. A key idea of content-centric networks is to addre...
Suman Srinivasan, Ivica Rimac, Volker Hilt, Moritz...
SIGMOD
2004
ACM
131views Database» more  SIGMOD 2004»
14 years 7 months ago
Order-Preserving Encryption for Numeric Data
Encryption is a well established technology for protecting sensitive data. However, once encrypted, data can no longer be easily queried aside from exact matches. We present an or...
Rakesh Agrawal, Jerry Kiernan, Ramakrishnan Srikan...