Sciweavers

1266 search results - page 143 / 254
» Threat Evaluation Method for Distributed Network Environment
Sort
View
ICCCN
2007
IEEE
15 years 10 months ago
Maintaining Routing Tree in IEEE 802.16 Centralized Scheduling Mesh Networks
Abstract— The IEEE 802.16 mesh mode supports two scheduling mechanisms, namely centralized scheduling and distributed scheduling. Centralized scheduling is based on a routing tre...
Yanbin Lu, Guoqing Zhang
MSS
1999
IEEE
121views Hardware» more  MSS 1999»
15 years 8 months ago
Device Locks: Mutual Exclusion for Storage Area Networks
Device Locks are mechanisms used in distributed environments to facilitate mutual exclusion of shared resources. They can further be used to maintain coherence of data that is cac...
Kenneth W. Preslan, Steven R. Soltis, Christopher ...
VR
2010
IEEE
154views Virtual Reality» more  VR 2010»
15 years 2 months ago
On error bound estimation for motion prediction
A collaborative virtual environment (CVE) allows remote users to access and modify shared data through networks, such as the Internet. However, when the users are connected via th...
Rynson W. H. Lau, Kenneth Lee
CEC
2009
IEEE
15 years 11 months ago
Dynamic search initialisation strategies for multi-objective optimisation in peer-to-peer networks
Abstract— Peer-to-peer based distributed computing environments can be expected to be dynamic to greater of lesser degree. While node losses will not usually lead to catastrophic...
Ian Scriven, Andrew Lewis, Sanaz Mostaghim
MOBISYS
2005
ACM
16 years 3 months ago
An overlay MAC layer for 802.11 networks
The widespread availability of 802.11-based hardware has made it the premier choice of both researchers and practitioners for developing new wireless networks and applications. Ho...
Ananth Rao, Ion Stoica