Sciweavers

1266 search results - page 135 / 254
» Threat Evaluation Method for Distributed Network Environment
Sort
View
ECIR
2006
Springer
15 years 5 months ago
Comparing Different Architectures for Query Routing in Peer-to-Peer Networks
Abstract. Efficient and effective routing of content-based queries is an emerging problem in peer-to-peer networks, and can be seen as an extension of the traditional "resourc...
Henrik Nottelmann, Norbert Fuhr
IROS
2007
IEEE
196views Robotics» more  IROS 2007»
15 years 10 months ago
Self-healing for mobile robot networks with motion synchronization
—The objective of self-healing in mobile robot networks is to maintain not only logical topology but also physical one of a network when robots fail. An interaction dynamics mode...
Fei Zhang, Weidong Chen
CN
2004
103views more  CN 2004»
15 years 4 months ago
Providing end-to-end service level agreements across multiple ISP networks
Due to the autonomous nature of ISPs, the service level agreement (SLA) offering is currently confined to within a single provider network. In this work, we examine some methods o...
Panita Pongpaibool, Hyong S. Kim
ICDCS
2010
IEEE
15 years 1 months ago
Versatile Stack Management for Multitasking Sensor Networks
Abstract--The networked application environment has motivated the development of multitasking operating systems for sensor networks and other low-power electronic devices, but thei...
Rui Chu, Lin Gu, Yunhao Liu, Mo Li, Xicheng Lu
ICON
2007
IEEE
15 years 10 months ago
Myth: An Accurate and Scalable Network Coordinate System under High Node Churn Rate
—Network coordinate (NC) system is an efficient mechanism to predict Internet distance (latency) with limited times of measurement. In this paper, we focus on the node churn pro...
Yang Chen, Genyi Zhao, Ang Li, Beixing Deng, Xing ...