Sciweavers

1995 search results - page 243 / 399
» Parallel and Distributed VHDL Simulation
Sort
View
COLCOM
2008
IEEE
14 years 2 months ago
Security through Collaboration in MANETs
It is well understood that Mobile Ad Hoc Networks (MANETs) are extremely susceptible to a variety of attacks, and traditional security mechanisms do not work well. Many security sc...
Wenjia Li, James Parker, Anupam Joshi
CLUSTER
2006
IEEE
14 years 2 months ago
SLA-Based Coordinated Superscheduling Scheme for Computational Grids
The Service Level Agreement (SLA) based grid superscheduling approach promotes coordinated resource sharing. Superscheduling is facilitated between administratively and topologica...
Rajiv Ranjan, Aaron Harwood, Rajkumar Buyya
ICPADS
2006
IEEE
14 years 2 months ago
Optimal Movement-Assisted Sensor Deployment and Its Extensions in Wireless Sensor Networks
In wireless sensor networks (WSNs), a good sensor deployment method is vital to the quality of service (QoS) provided by WSNs. This QoS depends on the coverage of the monitoring a...
Jie Wu, Shuhui Yang
ICRA
2006
IEEE
77views Robotics» more  ICRA 2006»
14 years 2 months ago
Scalable Shape Sculpting via Hole Motion: Motion Planning in Lattice-constrained Modular Robots
— We describe a novel shape formation algorithm for ensembles of 2-dimensional lattice-arrayed modular robots, based on the manipulation of regularly shaped voids within the latt...
Michael DeRosa, Seth Copen Goldstein, Peter Lee, J...
GCC
2005
Springer
14 years 1 months ago
Exploiting the Heterogeneity in Structured Peer-to-Peer Systems
The structured peer-to-peer system, which is based on the distributed hash table, offers an administration-free and fault-tolerant application-level overlay network. However, a ra...
Tongqing Qiu, Guihai Chen