Sciweavers

1333 search results - page 263 / 267
» Termination Detection of Local Computations
Sort
View
IFIP
2005
Springer
14 years 1 months ago
Global Internet Routing Forensics: Validation of BGP Paths Using ICMP Traceback
Nearly all network applications rely on the global Internet routing infrastructure to compute routes and deliver packets. Unfortunately, false Internet routes can be maliciously in...
Eunjong Kim, Daniel Massey, Indrajit Ray
CISIS
2010
IEEE
14 years 26 days ago
Resilient Critical Infrastructure Management Using Service Oriented Architecture
—The SERSCIS project aims to support the use of interconnected systems of services in Critical Infrastructure (CI) applications. The problem of system interconnectedness is aptly...
Martin Hall-May, Mike Surridge
ICNP
2003
IEEE
14 years 25 days ago
Data Dissemination with Ring-Based Index for Wireless Sensor Networks
In current sensor networks, sensor nodes are capable of not only measuring real world phenomena, but also storing, processing and transferring these measurements. Many data dissem...
Wensheng Zhang, Guohong Cao, Thomas F. La Porta
MOBICOM
2003
ACM
14 years 24 days ago
Enhancing TCP fairness in ad hoc wireless networks using neighborhood RED
Significant TCP unfairness in ad hoc wireless networks has been reported during the past several years. This unfairness results from the nature of the shared wireless medium and ...
Kaixin Xu, Mario Gerla, Lantao Qi, Yantai Shu
NETGAMES
2003
ACM
14 years 24 days ago
Bandwidth requirement and state consistency in three multiplayer game architectures
Abstract— Multiplayer games become increasingly popular, mostly because they involve interaction among humans. Typically, multiplayer games are organized based on a Client-Server...
Joseph D. Pellegrino, Constantinos Dovrolis