Sciweavers

1266 search results - page 14 / 254
» Threat Evaluation Method for Distributed Network Environment
Sort
View
ECOOPW
1999
Springer
13 years 11 months ago
Security in Active Networks
The desire for exible networking services has given rise to the concept of active networks." Active networks provide a general framework for designing and implementing network...
D. Scott Alexander, William A. Arbaugh, Angelos D....
IPPS
2008
IEEE
14 years 1 months ago
Evaluation of dynamic scheduling methods in simulations of storm-time ion acceleration
In this paper we investigate the applicability of classic dynamic loop scheduling methods on a numerical simulation code that calculates the trajectories of charged particles in t...
Ioannis Riakiotakis, Georgios I. Goumas, Nectarios...
MOBILITY
2009
ACM
14 years 1 months ago
Feasibility evaluation of a communication-oriented P2P system in mobile environments
We present the feasibility evaluation of a structured communication-oriented Peer-to-Peer (P2P) system being used in mobile environments in this paper. The different levels of chu...
Zhonghong Ou, Erkki Harjula, Otso Kassinen, Mika Y...
IJSN
2008
145views more  IJSN 2008»
13 years 7 months ago
Clique-based group key assignment in Wireless Sensor Networks
: Security has become the corner stone of research in wireless sensor networks (WSNs). Due to the unique operational environment of WSNs, where the communication medium is open to ...
Avinash Srinivasan, Feng Li, Jie Wu, Minglu Li
ISPDC
2005
IEEE
14 years 28 days ago
On the Implementation and Evaluation of Berkeley Sockets on Maestro2 cluster computing environment
The support on cluster environments of ”legacy protocols” is important to avoid rewriting the code of applications, but this support should not prevent to achieve the maximum ...
Ricardo Guapo, Leonel Sousa, Shinichi Yamagiwa