Sciweavers

4612 search results - page 860 / 923
» More Communications
Sort
View
ICCCN
2007
IEEE
14 years 3 months ago
Interplay of Security and Reliability using Non-uniform Checkpoints
Real time applications such as military aircraft flight control systems and online banking are critical with respect to security and reliability. In this paper we presented a way ...
Kiranmai Bellam, Raghava K. Vudata, Xiao Qin, Zili...
ICDCS
2007
IEEE
14 years 3 months ago
An Asymmetric Quorum-based Power Saving Protocol for Clustered Ad Hoc Networks
Clustering in Mobile Ad Hoc Networks (MANETs) has shown to be a promising technique to ensure the scalability and efficiency of various communication protocols. Since stations in...
Shan-Hung Wu, Chung-Min Chen, Ming-Syan Chen
P2P
2007
IEEE
101views Communications» more  P2P 2007»
14 years 3 months ago
Grid Resource Scheduling with Gossiping Protocols
Abstract— Grid resource providers can use gossiping to disseminate their available resource state to remote regions of the grid to attract application load. Pairwise gossiping pr...
Deger Cenk Erdil, Michael J. Lewis
P2P
2007
IEEE
153views Communications» more  P2P 2007»
14 years 3 months ago
On Routing in Distributed Hash Tables
There have been many proposals for constructing routing tables for Distributed Hash Tables (DHT). They can be classified into two groups: A) those that assume that the peers are ...
Fabius Klemm, Sarunas Girdzijauskas, Jean-Yves Le ...
SECON
2007
IEEE
14 years 3 months ago
Robust Routing and Scheduling in Wireless Mesh Networks
—Joint routing-and-scheduling has been considered in wireless mesh networks for its significant performance improvement. While existing work assumes it, accurate traffic inform...
Wei Wang, Xin Liu, Dilip Krishnaswamy