Sciweavers

448 search results - page 53 / 90
» Experience with Parallel Computing on the AN2 Network
Sort
View
ICDCS
2005
IEEE
14 years 2 months ago
Virtual Leashing: Internet-Based Software Piracy Protection
Software-splitting is a technique for protecting software from piracy by removing code fragments from an application and placing them on a remote trusted server. The server provid...
Ori Dvir, Maurice Herlihy, Nir Shavit
PDP
2002
IEEE
14 years 1 months ago
A Jini Framework for Distributed Service Flexibility
Existing distributed middleware technologies and Enterprise Application frameworks lack in support to service flexibility from both the developer’s and user’s point of view. ...
Domenico Cotroneo, Cristiano di Flora, Stefano Rus...
IPPS
2003
IEEE
14 years 1 months ago
Transparent Query Caching in Peer-to-Peer Overlay Networks
Peer-to-peer (p2p) systems such as Gnutella and KaZaa are routinely used by millions of people for sharing music and many other files over the Internet, and they account for a si...
Sunil Patro, Y. Charlie Hu
DCOSS
2009
Springer
13 years 6 months ago
Empirical Evaluation of Wireless Underground-to-Underground Communication in Wireless Underground Sensor Networks
Abstract. Many applications for irrigation management and environment monitoring exploit buried sensors wired-connected to the soil surface for information retrieval. Wireless Unde...
Agnelo R. Silva, Mehmet C. Vuran
SRDS
2008
IEEE
14 years 3 months ago
SeNDORComm: An Energy-Efficient Priority-Driven Communication Layer for Reliable Wireless Sensor Networks
In many reliable Wireless Sensor Network (WSN) applications, messages have different priorities depending on urgency or importance. For example, a message reporting the failure of...
Vinaitheerthan Sundaram, Saurabh Bagchi, Yung-Hsia...