Sciweavers

8555 search results - page 1611 / 1711
» Property Based Coordination
Sort
View
IPPS
2008
IEEE
14 years 3 months ago
Random choices for churn resilient load balancing in peer-to-peer networks
Peer-to-peer (P2P) networks based on consistent hashing functions have an inherent load uneven distribution problem. Things are even worse in unstructured P2P systems. The objecti...
Song Fu, Cheng-Zhong Xu, Haiying Shen
IPPS
2008
IEEE
14 years 3 months ago
A game theoretical data replication technique for mobile ad hoc networks
Adaptive replication of data items on servers of a mobile ad hoc network can alleviate access delays. The selection of data items and servers requires solving a constrained optimi...
Samee Ullah Khan, Anthony A. Maciejewski, Howard J...
IROS
2008
IEEE
151views Robotics» more  IROS 2008»
14 years 3 months ago
A foveated passive UHF RFID system for mobile manipulation
Abstract— We present a novel antenna and system architecture for mobile manipulation based on passive RFID technology operating in the 850MHz-950MHz ultra-high-frequency (UHF) sp...
Travis Deyle, Cressel D. Anderson, Charles C. Kemp...
ISCC
2008
IEEE
119views Communications» more  ISCC 2008»
14 years 3 months ago
Deterministic service on IEEE 802.11-like networks
Wireless IEEE 802.11 networks are typically deployed as a convenient and flexible way to access wired backbones. However, due to the inherently shared nature and physical propert...
Mario Baldi, Marco Papa Manzillo
ITNG
2008
IEEE
14 years 3 months ago
Hierarchy-Driven Approach for Attack Patterns in Software Security Education
We propose a hierarchy-driven approach to facilitate student learning and foster a deeper understanding of the importance of attack patterns in computer, network, and software sec...
Joshua J. Pauli, Patrick Henry Engebretson
« Prev « First page 1611 / 1711 Last » Next »