Sciweavers

1266 search results - page 150 / 254
» Threat Evaluation Method for Distributed Network Environment
Sort
View
NOSSDAV
2010
Springer
15 years 9 months ago
Performance analysis of home streaming video using Orb
A new paradigm in video streaming is emerging, that of personal video servers in the home streaming video to remote clients on the Internet. The potential impact of such technolog...
Rabin Karki, Thangam Seenivasan, Mark Claypool, Ro...
COMPSAC
2006
IEEE
15 years 10 months ago
Application of Fuzzy Logic in Federated Trust Management for Pervasive Computing
In federated and pervasive networks, trust management has become a cornerstone for information security and privacy. Although people have recognized the importance of privacy and ...
Zhengping Wu, Alfred C. Weaver
INFOCOM
2011
IEEE
14 years 7 months ago
Fine-grained location-free planarization in wireless sensor networks
—Extracting planar graph from network topologies is of great importance for efficient protocol design in wireless ad hoc and sensor networks. Previous techniques of planar topol...
Dezun Dong, Yunhao Liu, Xiangke Liao, Xiang-Yang L...
COORDINATION
2008
Springer
15 years 6 months ago
CiAN: A Workflow Engine for MANETs
Most mature workflow management systems (WfMSs) available today execute workflows via orchestration of an available set of services, a process in which a central coordinating enti...
Rohan Sen, Gruia-Catalin Roman, Christopher D. Gil...
MASCOTS
2007
15 years 5 months ago
Network Performance Analysis based on Histogram Workload Models
Network performance analysis relies mainly on two models: a workload model and a performance model. This paper proposes to use histograms for characterising the arrival workloads ...
Enrique Hernández-Orallo, Joan Vila-Carb&oa...