Sciweavers

1266 search results - page 124 / 254
» Threat Evaluation Method for Distributed Network Environment
Sort
View
MOBIQUITOUS
2005
IEEE
15 years 10 months ago
Content-Based Routing in Mobile Ad Hoc Networks
The publish/subscribe model of communication provides sender/receiver decoupling and selective information dissemination that is appropriate for mobile environments characterized ...
Milenko Petrovic, Vinod Muthusamy, Hans-Arno Jacob...
CN
2008
116views more  CN 2008»
15 years 4 months ago
A multiple power-level approach for wireless sensor network positioning
Wireless sensor networks enhance our ability to monitor the physical world. Many recent researches on wireless sensor networks have focused on aspects such as routing, node cooper...
Jen-Yu Fang, Hung-Chi Chu, Rong-Hong Jan, Wuu Yang
ISCC
2002
IEEE
118views Communications» more  ISCC 2002»
15 years 9 months ago
A study of QoS performance for real time applications over a differentiated services network
Abstract: The Differentiated Service Architecture (DiffServ) is currently a popular research topic as a lowcost method to provide Quality of Service to the different applications i...
Evi Tsolakou, Eugenia G. Nikolouzou, Iakovos S. Ve...
MASCOTS
2010
15 years 5 months ago
Fair Allocation of Substrate Resources among Multiple Overlay Networks
Overlay networks are becoming prevalent in today's networking environment. We consider scenarios where substrate resources are primarily consumed by many overlay networks plac...
Mehmet Demirci, Mostafa H. Ammar
EICS
2011
ACM
14 years 8 months ago
A model-based approach for distributed user interfaces
This paper describes a model-based approach for designing distributed user interfaces (DUIs), i.e. graphical user interfaces that are distributed along one or many of the followin...
Jérémie Melchior, Jean Vanderdonckt,...