Sciweavers

986 search results - page 74 / 198
» Simulation Modeling of Weak-Consistency Protocols
Sort
View
INFOCOM
2010
IEEE
13 years 7 months ago
A Balanced Consistency Maintenance Protocol for Structured P2P Systems
—A fundamental challenge of managing mutable data replication in a Peer-to-Peer (P2P) system is how to efficiently maintain consistency under various sharing patterns with heter...
Yi Hu, Min Feng, Laxmi N. Bhuyan
CN
2004
109views more  CN 2004»
13 years 8 months ago
Architectures and protocols for mobile computing applications: a reconfigurable approach
This work deals with reconfigurable control functions and protocols for supporting mobile computing applications in heterogeneous wireless systems like cellular networks and WLANs...
Carla-Fabiana Chiasserini, Francesca Cuomo, Leonar...
ICC
2009
IEEE
121views Communications» more  ICC 2009»
13 years 6 months ago
Three Layered Hidden Markov Models for Binary Digital Wireless Channels
Abstract--Generative models are created to be used in the design and performance assessment of high layer wireless communication protocols and some error control strategies. Genera...
Omar S. Salih, Cheng-Xiang Wang, David I. Laurenso...
WMASH
2004
ACM
14 years 2 months ago
Reputation-based Wi-Fi deployment protocols and security analysis
In recent years, wireless Internet service providers (WISPs) have established thousands of WiFi hot spots in cafes, hotels and airports in order to offer to travelling Internet u...
Naouel Ben Salem, Jean-Pierre Hubaux, Markus Jakob...
CSREASAM
2010
13 years 5 months ago
Modeling NIDS Evasion with Genetic Programming
Nowadays, Network Intrusion Detection Systems are quickly updated in order to prevent systems against new attacks. This situation has provoked that attackers focus their efforts on...
Sergio Pastrana, Agustín Orfila, Arturo Rib...