Sciweavers

1503 search results - page 285 / 301
» Self-optimizing distributed trees
Sort
View
MOBICOM
2009
ACM
14 years 1 months ago
Opportunistic flooding in low-duty-cycle wireless sensor networks with unreliable links
Intended for network-wide dissemination of commands, configurations and code binaries, flooding has been investigated extensively in wireless networks. However, little work has ...
Shuo Guo, Yu Gu, Bo Jiang, Tian He
SACMAT
2009
ACM
14 years 1 months ago
Towards formal security analysis of GTRBAC using timed automata
An access control system is often viewed as a state transition system. Given a set of access control policies, a general safety requirement in such a system is to determine whethe...
Samrat Mondal, Shamik Sural, Vijayalakshmi Atluri
CISS
2008
IEEE
14 years 1 months ago
Peer-to-Peer utility maximization
—In this paper, we study the problem of utility maximization in Peer-to-Peer (P2P) systems, in which aggregate utilities are maximized by running distributed algorithms on P2P no...
Minghua Chen, Sudipta Sengupta, Miroslav Ponec, Ph...
CLUSTER
2008
IEEE
14 years 1 months ago
Impact of topology and link aggregation on a PC cluster with Ethernet
Abstract—In addition to its use in local area networks, Ethernet has been used for connecting hosts in the area of highperformance computing. Here, we investigated the impact of ...
Takafumi Watanabe, Masahiro Nakao, Tomoyuki Hiroya...
ICDCSW
2008
IEEE
14 years 1 months ago
Scalable AOI-Cast for Peer-to-Peer Networked Virtual Environments
Networked virtual environments (NVEs) are computergenerated virtual worlds where users interact by exchanging messages via network connections. Each NVE user often pays attention ...
Jehn-Ruey Jiang, Yu-Li Huang, Shun-Yun Hu