Sciweavers

1727 search results - page 294 / 346
» Petascale System Management Experiences
Sort
View
ADHOC
2007
104views more  ADHOC 2007»
13 years 8 months ago
An overlay approach to data security in ad-hoc networks
While it has been argued that application-layer overlay protocols can enhance services in mobile ad-hoc networks, hardly any empirical data is available on the throughput and dela...
Jörg Liebeherr, Guangyu Dong
JNW
2008
79views more  JNW 2008»
13 years 8 months ago
Smart Classrooms for Distance Education and their Adoption to Multiple Classroom Architecture
This paper provides an overview of the technologies used in smart classrooms for distance education by classifying smart classrooms into four categories and discussing the type of ...
Davar Pishva, G. G. D. Nishantha
JCP
2006
110views more  JCP 2006»
13 years 8 months ago
Gateway Selection Review in Ad hoc Networks
The nature of wireless mobile ad hoc networks depend on batteries or other fatiguing means for their energy. A limited energy capacity may be the most significant performance const...
Tarek Sheltami
TISSEC
2008
202views more  TISSEC 2008»
13 years 8 months ago
A Framework for Identifying Compromised Nodes in Wireless Sensor Networks
compromised sensor nodes. The framework provides an appropriate abstraction of applicationspecific detection mechanisms and models the unique properties of sensor networks. Based o...
Qing Zhang, Ting Yu, Peng Ning
ISCI
2002
86views more  ISCI 2002»
13 years 8 months ago
Schedulable region for VBR media transmission with optimal resource allocation and utilization
Media data are VBR in nature due to the coding and compression technologies applied. As VBR streams are complicated for network management, different approaches were proposed to s...
Ray-I Chang, Meng Chang Chen, Jan-Ming Ho, Ming-Ta...