Sciweavers

8555 search results - page 1611 / 1711
» Property Based Coordination
Sort
View
IPPS
2008
IEEE
15 years 11 months ago
Random choices for churn resilient load balancing in peer-to-peer networks
Peer-to-peer (P2P) networks based on consistent hashing functions have an inherent load uneven distribution problem. Things are even worse in unstructured P2P systems. The objecti...
Song Fu, Cheng-Zhong Xu, Haiying Shen
IPPS
2008
IEEE
15 years 11 months ago
A game theoretical data replication technique for mobile ad hoc networks
Adaptive replication of data items on servers of a mobile ad hoc network can alleviate access delays. The selection of data items and servers requires solving a constrained optimi...
Samee Ullah Khan, Anthony A. Maciejewski, Howard J...
IROS
2008
IEEE
151views Robotics» more  IROS 2008»
15 years 11 months ago
A foveated passive UHF RFID system for mobile manipulation
Abstract— We present a novel antenna and system architecture for mobile manipulation based on passive RFID technology operating in the 850MHz-950MHz ultra-high-frequency (UHF) sp...
Travis Deyle, Cressel D. Anderson, Charles C. Kemp...
ISCC
2008
IEEE
119views Communications» more  ISCC 2008»
15 years 11 months ago
Deterministic service on IEEE 802.11-like networks
Wireless IEEE 802.11 networks are typically deployed as a convenient and flexible way to access wired backbones. However, due to the inherently shared nature and physical propert...
Mario Baldi, Marco Papa Manzillo
ITNG
2008
IEEE
15 years 11 months ago
Hierarchy-Driven Approach for Attack Patterns in Software Security Education
We propose a hierarchy-driven approach to facilitate student learning and foster a deeper understanding of the importance of attack patterns in computer, network, and software sec...
Joshua J. Pauli, Patrick Henry Engebretson
« Prev « First page 1611 / 1711 Last » Next »