Sciweavers

905 search results - page 153 / 181
» Public key distribution through
Sort
View
ICDCSW
2003
IEEE
14 years 1 months ago
LHAP: A Lightweight Hop-by-Hop Authentication Protocol for Ad-Hoc Networks
Most ad hoc networks do not implement any network access control, leaving these networks vulnerable to resource consumption attacks where a malicious node injects packets into the...
Sencun Zhu, Shouhuai Xu, Sanjeev Setia, Sushil Jaj...
INFOCOM
2003
IEEE
14 years 1 months ago
Understanding CHOKe
— A recently proposed active queue management, CHOKe, is stateless, simple to implement, yet surprisingly effective in protecting TCP from UDP flows. As UDP rate increases, even...
Ao Tang, Jiantao Wang, Steven H. Low
EUROPAR
2003
Springer
14 years 1 months ago
Obtaining Hardware Performance Metrics for the BlueGene/L Supercomputer
Hardware performance monitoring is the basis of modern performance analysis tools for application optimization. We are interested in providing such performance analysis tools for t...
Pedro Mindlin, José R. Brunheroto, Luiz De ...
GECCO
2010
Springer
212views Optimization» more  GECCO 2010»
14 years 1 months ago
Generative and developmental systems
This paper argues that multiagent learning is a potential “killer application” for generative and developmental systems (GDS) because key challenges in learning to coordinate ...
Kenneth O. Stanley
ICRA
2000
IEEE
93views Robotics» more  ICRA 2000»
14 years 1 months ago
Scheduling and Coordination in Manufacturing Enterprise Automation
Manufacturing enterprise automation was focused on factory level where scheduling is a key issue in the past. As more and more companies are relying on their business parmers or s...
Haoxun Chen, Peter B. Luh