Sciweavers

20638 search results - page 95 / 4128
» Network Computing
Sort
View
BROADNETS
2007
IEEE
14 years 2 months ago
Computer worm ecology in encounter-based networks
Abstract— Encounter-based network is a frequentlydisconnected wireless ad-hoc network requiring immediate neighbors to store and forward aggregated data for information dissemina...
Sapon Tanachaiwiwat, Ahmed Helmy
JOC
2006
71views more  JOC 2006»
13 years 8 months ago
Private Computation: k-Connected versus 1-Connected Networks
We study the role of connectivity of communication networks in private computations under information theoretic settings. It will be shown that some functions can be computed by pr...
Markus Bläser, Andreas Jakoby, Maciej Liskiew...
CORR
2010
Springer
106views Education» more  CORR 2010»
13 years 6 months ago
Simulation of Computer Network Attacks
In this work we present a prototype for simulating computer network attacks. Our objective is to simulate large networks (thousands of hosts, with applications and vulnerabilities)...
Carlos Sarraute, Fernando Miranda, José Ign...
DATE
2003
IEEE
100views Hardware» more  DATE 2003»
14 years 1 months ago
Dynamic Tool Integration in Heterogeneous Computer Networks
Tool installation and automation of administrative tasks in heterogeneous computer networks becomes of increasing importance with the availability of complex heterogeneous compute...
Wolfgang Müller 0003, Tim Schattkowsky, Heinz...
ICDCS
2000
IEEE
14 years 18 days ago
On the Burstiness of the TCP Congestion-Control Mechanism in a Distributed Computing System
Several studies in network traffic characterization have concluded that network traffic is self-similar and therefore not readily amenable to statistical multiplexing in a distr...
Peerapol Tinnakornsrisuphap, Wu-chun Feng, Ian R. ...