Sciweavers

1266 search results - page 142 / 254
» Threat Evaluation Method for Distributed Network Environment
Sort
View
RTSS
2009
IEEE
15 years 11 months ago
Towards Stable Network Performance in Wireless Sensor Networks
Abstract—Many applications in wireless sensor networks require communication performance that is both consistent and high quality. Unfortunately, performance of current network p...
Shan Lin, Gang Zhou, Kamin Whitehouse, Yafeng Wu, ...
ICNP
2003
IEEE
15 years 9 months ago
On the Cost-Quality Tradeoff in Topology-Aware Overlay Path Probing
Path probing is essential to maintaining an efficient overlay network topology. However, the cost of a full-scale probing is as high as ¢¤£¦¥¨§© , which is prohibitive i...
Chiping Tang, Philip K. McKinley
COMCOM
2007
99views more  COMCOM 2007»
15 years 4 months ago
Topology-aware overlay path probing
Path probing is essential to maintaining an efficient overlay network topology. However, the cost of a full-scale probing is as high as O(n2 ), which is prohibitive in large-scale...
Chiping Tang, Philip K. McKinley
GPC
2007
Springer
15 years 10 months ago
Heterogeneous Wireless Sensor Network Deployment and Topology Control Based on Irregular Sensor Model
Heterogeneous wireless sensor network (heterogeneous WSN) consists of sensor nodes with different ability, such as different computing power and sensing range. Compared with homoge...
Chun-Hsien Wu, Yeh-Ching Chung
134
Voted
ADHOC
2008
118views more  ADHOC 2008»
15 years 4 months ago
A localized certificate revocation scheme for mobile ad hoc networks
The issue of certificate revocation in mobile ad hoc networks (MANETs) where there are no on-line access to trusted authorities, is a challenging problem. In wired network environ...
Geneviève Arboit, Claude Crépeau, Ca...