Sciweavers

1266 search results - page 139 / 254
» Threat Evaluation Method for Distributed Network Environment
Sort
View
PARA
2000
Springer
15 years 7 months ago
Experiments in Separating Computational Algorithm from Program Distribution and Communication
Our proposal has the following key features: 1) The separation of a distributed program into a pure algorithm (PurAl) and a distribution/communication declaration (DUAL). This yie...
Raphael B. Yehezkael, Yair Wiseman, H. G. Mendelba...
ATAL
2009
Springer
15 years 10 months ago
Stigmergic reasoning over hierarchical task networks
Stigmergy is usually associated with semantically simple problems such as routing. It can be applied to more complex problems by encoding them in the environment through which sti...
H. Van Dyke Parunak, Theodore C. Belding, Robert B...
ICPP
2003
IEEE
15 years 9 months ago
Quorum-Based Asynchronous Power-Saving Protocols for IEEE 802.11 Ad Hoc Networks
This paper investigates the power mode management problem for an IEEE 802.11-based mobile ad hoc network (MANET) that allows mobile hosts to tune to the power-saving (PS) mode. The...
Jehn-Ruey Jiang, Yu-Chee Tseng, Chih-Shun Hsu, Ten...
ADHOC
2007
113views more  ADHOC 2007»
15 years 4 months ago
Channelization for dynamic multi-frequency, multi-hop wireless cellular networks
Multi-hop relaying in cellular networks can greatly increase capacity and performance by exploiting the best available links to a base station. We envision an environment in which...
Jaesheung Shin, Raju Kumar, Parthu Kishen, Thomas ...
SIGMETRICS
2004
ACM
118views Hardware» more  SIGMETRICS 2004»
15 years 9 months ago
Optimizing the quality of scalable video streams on P2P networks
— The volume of multimedia data, including video, served through Peer-to-Peer (P2P) networks is growing rapidly. Unfortunately, high bandwidth transfer rates are rarely available...
Raj Kumar Rajendran, Dan Rubenstein