Sciweavers

2024 search results - page 318 / 405
» Providing Secure Environments for Untrusted Network Applicat...
Sort
View
ADHOC
2007
122views more  ADHOC 2007»
15 years 4 months ago
Minimum latency joint scheduling and routing in wireless sensor networks
Wireless sensor networks are expected to be used in a wide range of applications from environment monitoring to event detection. The key challenge is to provide energy efficient ...
Gang Lu, Bhaskar Krishnamachari
ISCAPDCS
2007
15 years 6 months ago
Efficient soft QoS guarantee in mobile ad hoc networks
More and more Quality of Service (QoS) sensitive applications, such as streaming media, high bandwidth content distribution and VoIP, will be deployed in Mobile Ad hoc Networks (M...
Gaogang Xie, Zhenyu Li, Valérie Issarny, Al...
ICDE
2006
IEEE
159views Database» more  ICDE 2006»
15 years 10 months ago
Replication Based on Objects Load under a Content Distribution Network
Users tend to use the Internet for “resource-hungry” applications (which involve content such as video, audio on-demand and distributed data) and at the same time, more and mo...
George Pallis, Konstantinos Stamos, Athena Vakali,...
PERCOM
2008
ACM
16 years 4 months ago
Multiagent Place-Based Virtual Communities for Pervasive Computing
This paper proposes a multiagent based virtual community as a new means to support pervasive computing services. We give a conceptual definition of the concept of Place-Based Virt...
Tuan Nguyen, Seng Wai Loke, Torab Torabi, Hongen L...
ICPP
2009
IEEE
15 years 11 months ago
A Heuristic for Mapping Virtual Machines and Links in Emulation Testbeds
Distributed system emulators provide a paramount platform for testing of network protocols and distributed applications in clusters and networks of workstations. However, to allow...
Rodrigo N. Calheiros, Rajkumar Buyya, César...