Sciweavers

1035 search results - page 124 / 207
» System Services for Implementing Ad-Hoc Routing Protocols
Sort
View
IMC
2005
ACM
14 years 1 months ago
Novel Approaches to End-to-End Packet Reordering Measurement
By providing the best-effort service, the Internet Protocol (IP) does not maintain the same order of packets sent out by a host. Therefore, due to the route change, parallelism in...
Xiapu Luo, Rocky K. C. Chang
IJAOSE
2007
82views more  IJAOSE 2007»
13 years 7 months ago
West2East: exploiting WEb Service Technologies to Engineer Agent-based SofTware
This paper describes West2East, a Computer-Aided Agent-Oriented Software Engineering toolkit aimed at supporting the implementation of multiagent systems. West2East exploits langua...
Giovanni Casella, Viviana Mascardi
ALGOSENSORS
2007
Springer
13 years 9 months ago
Intrusion Detection of Sinkhole Attacks in Wireless Sensor Networks
Abstract. In this paper, we present an Intrusion Detection System designed for wireless sensor networks and show how it can be configured to detect Sinkhole attacks. A Sinkhole at...
Ioannis Krontiris, Tassos Dimitriou, Thanassis Gia...
SIGMOD
2010
ACM
255views Database» more  SIGMOD 2010»
14 years 20 days ago
Indexing multi-dimensional data in a cloud system
Providing scalable database services is an essential requirement for extending many existing applications of the Cloud platform. Due to the diversity of applications, database ser...
Jinbao Wang, Sai Wu, Hong Gao, Jianzhong Li, Beng ...
EDCC
2010
Springer
14 years 20 days ago
D2HT: The Best of Both Worlds, Integrating RPS and DHT
Distributed Hash Tables (DHTs) and Random Peer Sampling (RPS) provide important and complementary services in the area of P2P overlay networks. DHTs achieve efficient lookup whil...
Marin Bertier, François Bonnet, Anne-Marie ...