Sciweavers

1266 search results - page 149 / 254
» Threat Evaluation Method for Distributed Network Environment
Sort
View
INAP
2001
Springer
15 years 8 months ago
iML: A Logic-based Framework for Constructing Graphical User Interface on Mobile Agents
Mobile agent technology is an emerging technology that allows easier design, implementation, and maintenance of distributed systems. Mobility enables agents to reduce network load,...
Naoki Fukuta, Nobuaki Mizutani, Tadachika Ozono, T...
123
Voted
NSDI
2007
15 years 6 months ago
Tesseract: A 4D Network Control Plane
We present Tesseract, an experimental system that enables the direct control of a computer network that is under a single administrative domain. Tesseract’s design is based on t...
Hong Yan, David A. Maltz, T. S. Eugene Ng, Hemant ...
PIMRC
2010
IEEE
15 years 2 months ago
Contact surround in opportunistic networks
Abstract--Is the temporal dimension alone sufficient to characterize contacts in opportunistic networks? Several studies analyze the temporal aspect of contacts with significant re...
Nadjet Belblidia, Marcelo Dias de Amorim, Jeremie ...
IPPS
2006
IEEE
15 years 10 months ago
k-anycast routing schemes for mobile ad hoc networks
— Anycast is a communication paradigm that was first introduced to the suit of routing protocols in IPv6 networks. In anycast, a packet is intended to be delivered to one of the...
Bing Wu, Jie Wu
EUROSYS
2007
ACM
16 years 1 months ago
Macroprogramming heterogeneous sensor networks using cosmos
In this paper, we present COSMOS, a novel architecture for macroprogramming heterogeneous sensor network systems. Macroprogramming entails aggregate system behavior specification...
Asad Awan, Suresh Jagannathan, Ananth Grama