Sciweavers

1266 search results - page 146 / 254
» Threat Evaluation Method for Distributed Network Environment
Sort
View
ICRA
2003
IEEE
124views Robotics» more  ICRA 2003»
15 years 9 months ago
Self-assembly in space via self-reconfigurable robots
― Self-assembly systems in space are arguably within the reach of today’s technology based on the research and development of self-reconfigurable robots on earth. This paper pr...
Wei-Min Shen, Peter M. Will, Berok Khoshnevis
ICC
2007
IEEE
124views Communications» more  ICC 2007»
15 years 10 months ago
Emulating End-to-End Losses and Delays for Ad Hoc Networks
— Ad hoc networks have gained place in the research area recently. There are many researches regarding different topics related to such networks, such as routing, media access co...
Alaa Seddik-Ghaleb, Yacine Ghamri-Doudane, Sidi-Mo...
IPSN
2004
Springer
15 years 9 months ago
Backcasting: adaptive sampling for sensor networks
Wireless sensor networks provide an attractive approach to spatially monitoring environments. Wireless technology makes these systems relatively flexible, but also places heavy d...
Rebecca Willett, Aline Martin, Robert Nowak
MOBIHOC
2008
ACM
16 years 3 months ago
Analyzing DISH for multi-channel MAC protocols in wireless networks
For long, node cooperation has been exploited as a data relaying mechanism. However, the wireless channel allows for much richer interaction between nodes. One such scenario is in...
Tie Luo, Mehul Motani, Vikram Srinivasan
CLOUD
2010
ACM
15 years 9 months ago
Comet: batched stream processing for data intensive distributed computing
Batched stream processing is a new distributed data processing paradigm that models recurring batch computations on incrementally bulk-appended data streams. The model is inspired...
Bingsheng He, Mao Yang, Zhenyu Guo, Rishan Chen, B...