Sciweavers

4612 search results - page 752 / 923
» More Communications
Sort
View
INFOCOM
2008
IEEE
15 years 11 months ago
Link Lifetimes and Randomized Neighbor Selection in DHTs
—Several models of user churn, resilience, and link lifetime have recently appeared in the literature [12], [13], [34], [35]; however, these results do not directly apply to clas...
Zhongmei Yao, Dmitri Loguinov
NOMS
2008
IEEE
118views Communications» more  NOMS 2008»
15 years 10 months ago
Policy-based self-management of hybrid ad hoc networks for dynamic channel configuration
— Wireless networks have become a ubiquitous reality and ever more surround our everyday activities. They form and disappear around us spontaneously and have become new means for...
Antonis M. Hadjiantonis, George Pavlou
NOMS
2008
IEEE
123views Communications» more  NOMS 2008»
15 years 10 months ago
Model-based management of security services in complex network environments
Abstract—The security mechanisms employed in current networked environments are increasingly complex, and their configuration management has an important role for the protection...
João Porto de Albuquerque, Heiko Krumm, Pau...
NOMS
2008
IEEE
139views Communications» more  NOMS 2008»
15 years 10 months ago
Fast similarity search in peer-to-peer networks
Abstract—Peer-to-peer (P2P) systems show numerous advantages over centralized systems, such as load balancing, scalability, and fault tolerance, and they require certain function...
Thomas Bocek, Ela Hunt, David Hausheer, Burkhard S...
SECON
2008
IEEE
15 years 10 months ago
A Demonstration of Video over a User Centric Prioritization Scheme for Wireless LANs
—Due to the unreliable nature of the wireless medium, provisioning of the Quality of Service (QoS) in wireless LANs is by far more complicated than in wired networks. In this dem...
Konstantinos Choumas, Thanasis Korakis, Leandros T...