Sciweavers

1266 search results - page 112 / 254
» Threat Evaluation Method for Distributed Network Environment
Sort
View
DSN
2008
IEEE
15 years 11 months ago
Hot-spot prediction and alleviation in distributed stream processing applications
Many emerging distributed applications require the realtime processing of large amounts of data that are being updated continuously. Distributed stream processing systems offer a ...
Thomas Repantis, Vana Kalogeraki
CDC
2010
IEEE
215views Control Systems» more  CDC 2010»
14 years 11 months ago
Consensus with robustness to outliers via distributed optimization
Over the past few years, a number of distributed algorithms have been developed for integrating the measurements acquired by a wireless sensor network. Among them, average consensu...
Jixin Li, Ehsan Elhamifar, I.-Jeng Wang, Ren&eacut...
DSN
2006
IEEE
15 years 10 months ago
Randomized Intrusion-Tolerant Asynchronous Services
Randomized agreement protocols have been around for more than two decades. Often assumed to be inefficient due to their high expected communication and time complexities, they ha...
Henrique Moniz, Nuno Ferreira Neves, Miguel Correi...
WINET
2010
153views more  WINET 2010»
15 years 2 months ago
Data aggregation in sensor networks using learning automata
One way to reduce energy consumption in wireless sensor networks is to reduce the number of packets being transmitted in the network. As sensor networks are usually deployed with a...
Mehdi Esnaashari, Mohammad Reza Meybodi
CN
2007
148views more  CN 2007»
15 years 4 months ago
Using taxonomies for content-based routing with ants
Although the ant metaphor has been successfully applied to routing of data packets both in wireless and fixed networks, little is known yet about its appropriateness for search i...
Elke Michlmayr, Arno Pany, Gerti Kappel