Sciweavers

986 search results - page 145 / 198
» Simulation Modeling of Weak-Consistency Protocols
Sort
View
IJWIS
2007
153views more  IJWIS 2007»
13 years 7 months ago
A security framework for agent-based systems
Purpose – This paper aims to address some security issues in open systems such as service-oriented applications and grid computing. It proposes a security framework for these sy...
Jamal Bentahar, Francesca Toni, John-Jules Ch. Mey...
WWW
2003
ACM
14 years 8 months ago
A Multicast-On-Large-Demand Approach to the Flash Crowd Problem
In this paper we propose a multicast-on-large-demand (MOLD) approach to the flash crowd problem. A MOLD Web server may dynamically open a multicast channel for resources when dete...
Rocky K. C. Chang
APSCC
2008
IEEE
14 years 2 months ago
Access Gateway Discovery and Selection in Hybrid Multihop Relay Vehicular Network
—Vehicular ad hoc network protocol with hybrid relay architecture is proposed for improving the success ratio. Access gateway estimation and a probability table based on the rout...
Shang-Pin Sheng, Ben-Yue Chang, Hung-Yu Wei
AVSS
2008
IEEE
14 years 2 months ago
Multi-camera Control through Constraint Satisfaction for Persistent Surveillance
We introduce a distributed camera coalition formation scheme for perceptive scene coverage and persistent surveillance by smart camera sensor networks. The proposed model supports...
Faisal Z. Qureshi, Demetri Terzopoulos
ICC
2007
IEEE
157views Communications» more  ICC 2007»
14 years 2 months ago
Secure Aggregation in Sensor Networks Using Neighborhood Watch
Abstract— Many sensor networks (SN) use in-network aggregation to minimize the amount of data transmitted by sensors. Unfortunately, aggregation makes the network more vulnerable...
Paul Rabinovich, Robert Simon