Sciweavers

1545 search results - page 91 / 309
» Opportunities in Opportunistic Computing
Sort
View
RAID
2009
Springer
14 years 3 months ago
Multi-byte Regular Expression Matching with Speculation
Intrusion prevention systems determine whether incoming traffic matches a database of signatures, where each signature in the database represents an attack or a vulnerability. IPSs...
Daniel Luchaup, Randy Smith, Cristian Estan, Somes...
IPPS
2008
IEEE
14 years 3 months ago
Middleware support for delay-tolerant service provision in disconnected mobile ad hoc networks
The service-oriented approach is known to be adequate for building distributed applications for mobile ad hoc networks, and a number of successful research works using this approa...
Yves Mahéo, Romeo Said, Frédé...
UIC
2007
Springer
14 years 2 months ago
Maximizing Network Lifetime Under Reliability Constraints Using a Cross-Layer Design in Dense Wireless Sensor Networks
Abstract. Recent experimental studies have shown that radio links between low-power devices are extremely unreliable. In particular, the instability and unpredictability of low-pow...
Shan Guo Quan, Young Yong Kim
EUROPAR
2003
Springer
14 years 2 months ago
A Coordination Model for ad hoc Mobile Systems
The growing success of wireless ad hoc networks and portable hardware devices presents many interesting problems to software engineers. Particular, coordination is a challenging t...
Marco Tulio de Oliveira Valente, Fernando Magno Qu...
DCOSS
2010
Springer
14 years 1 months ago
On Multihop Broadcast over Adaptively Duty-Cycled Wireless Sensor Networks
Abstract. We consider the problem of multihop broadcast over adaptively duty-cycled wireless sensor networks (WSNs) where neighborhood nodes are not simultaneously awake. We presen...
Shouwen Lai, Binoy Ravindran