Sciweavers

1695 search results - page 212 / 339
» Improved Algorithms for Synchronizing Computer Network Clock...
Sort
View
MOBIHOC
2010
ACM
15 years 6 days ago
Barrier coverage with sensors of limited mobility
Barrier coverage is a critical issue in wireless sensor networks for various battlefield and homeland security applications. The goal is to effectively detect intruders that attem...
Anwar Saipulla, Benyuan Liu, Guoliang Xing, Xinwen...
NOSSDAV
2009
Springer
15 years 9 months ago
Adaptive overlay topology for mesh-based P2P-TV systems
In this paper, we propose a simple and fully distributed mechanism for constructing and maintaining the overlay topology in mesh-based P2P-TV systems. Our algorithm optimizes the ...
Richard John Lobb, Ana Paula Couto da Silva, Emili...
NDSS
1998
IEEE
15 years 6 months ago
Some Timestamping Protocol Failures
Protocol failures are presented for two timestamping schemes. These failures emphasize the importance and di culty of implementing a secure protocol even though there exist secure...
Mike Just
IPTPS
2005
Springer
15 years 7 months ago
Locality Prediction for Oblivious Clients
To improve performance, large-scale Internet systems require clients to access nearby servers. While centralized systems can leverage static topology maps for rough network distan...
Kevin P. Shanahan, Michael J. Freedman
DAC
2002
ACM
16 years 3 months ago
A flexible accelerator for layer 7 networking applications
In this paper, we present a flexible accelerator designed for networking applications. The accelerator can be utilized efficiently by a variety of Network Processor designs. Most ...
Gokhan Memik, William H. Mangione-Smith