Sciweavers

189 search results - page 30 / 38
» Maintaining Comprehensive Resource Availability in P2P Netwo...
Sort
View
130
Voted
IPPS
2007
IEEE
15 years 10 months ago
Security Threat Prediction in a Local Area Network Using Statistical Model
In today’s large and complex network scenario vulnerability scanners play a major role from security perspective by proactively identifying the known security problems or vulner...
Somak Bhattacharya, S. K. Ghosh
134
Voted
DASFAA
2006
IEEE
145views Database» more  DASFAA 2006»
15 years 9 months ago
Processing Multiple Aggregation Queries in Geo-Sensor Networks
Abstract. To process aggregation queries issued through different sensors as access points in sensor networks, existing algorithms handle queries independently and perform in-netw...
Ken C. K. Lee, Wang-Chien Lee, Baihua Zheng, Julia...
140
Voted
GLOBECOM
2006
IEEE
15 years 9 months ago
Coverage-Preserving Routing Protocols for Randomly Distributed Wireless Sensor Networks
— Sensing coverage is an important issue for sensor networks, since it is viewed as one of the critical measures of performance offered by a sensor network. The design of a routi...
Yuh-Ren Tsai
127
Voted
JCP
2006
110views more  JCP 2006»
15 years 3 months ago
Gateway Selection Review in Ad hoc Networks
The nature of wireless mobile ad hoc networks depend on batteries or other fatiguing means for their energy. A limited energy capacity may be the most significant performance const...
Tarek Sheltami
125
Voted
CN
2004
108views more  CN 2004»
15 years 3 months ago
Routing bandwidth-guaranteed paths with restoration in label-switched networks
Label switched networks have become increasingly attractive to both network providers and customers. By creating aggregate, bandwidth-reserved flows, these networks offer routing ...
Samphel Norden, Milind M. Buddhikot, Marcel Waldvo...