Sciweavers

1266 search results - page 117 / 254
» Threat Evaluation Method for Distributed Network Environment
Sort
View
COLCOM
2007
IEEE
15 years 10 months ago
Uncompressed HD video for collaborative teaching - an experiment
Abstract—This article describes a distributed classroom experiment carried out by five universities in the US and Europe at the beginning of 2007. This experiment was motivated ...
Andrei Hutanu, Ravi Paruchuri, Daniel Eiland, Milo...
SASN
2005
ACM
15 years 10 months ago
Key distribution and update for secure inter-group multicast communication
Group communication has become an important component in wireless networks. In this paper, we focus on the environments in which multiple groups coexist in the system, and both in...
Weichao Wang, Bharat K. Bhargava
ICDCS
2009
IEEE
16 years 1 months ago
Protecting Neighbor Discovery Against Node Compromises in Sensor Networks
The neighborhood information has been frequently used by protocols such as routing in sensor networks. Many methods have been proposed to protect such information in hostile envir...
Donggang Liu
NOSSDAV
2001
Springer
15 years 8 months ago
Analysis of educational media server workloads
This paper presents an extensive analysis of the client workloads for educational media servers at two major U.S. universities. The goals of the analysis include providing data fo...
Jussara M. Almeida, Jeffrey Krueger, Derek L. Eage...
PEWASUN
2007
ACM
15 years 5 months ago
Worst-case lifetime computation of a wireless sensor network by model-checking
Wireless Sensor Network (WSN) technology is now mature enough to be used in numerous application domains. However, due to the restricted amount of energy usually allocated to each...
Laurent Mounier, Ludovic Samper, Wassim Znaidi