Sciweavers

1266 search results - page 176 / 254
» Threat Evaluation Method for Distributed Network Environment
Sort
View
ADHOC
2008
183views more  ADHOC 2008»
15 years 4 months ago
On ant routing algorithms in ad hoc networks with critical connectivity
This paper shows a novel self-organizing approach for routing datagrams in ad hoc networks, called Distributed Ant Routing (DAR). This approach belongs to the class of routing alg...
Laura Rosati, Matteo Berioli, Gianluca Reali
172
Voted
ICC
2008
IEEE
137views Communications» more  ICC 2008»
15 years 10 months ago
On the Effect of Localization Errors on Geographic Routing in Sensor Networks
—Recently, network localization systems that are based on inter-node ranges have received significant attention. Geographic routing has been considered an application which can u...
Bo Peng, Rainer Mautz, Andrew H. Kemp, Washington ...
GECCO
2010
Springer
183views Optimization» more  GECCO 2010»
15 years 8 months ago
Neuroevolution of mobile ad hoc networks
This paper describes a study of the evolution of distributed behavior, specifically the control of agents in a mobile ad hoc network, using neuroevolution. In neuroevolution, a p...
David B. Knoester, Heather Goldsby, Philip K. McKi...
WIMOB
2007
IEEE
15 years 10 months ago
A Gossip Protocol to Support Service Discovery with Heterogeneous Ontologies in MANETs
Service discovery in mobile ad hoc networks (MANETs) is an integral part for collective application interoperability. The discovery process must cope not only with transient commun...
Andronikos Nedos, Kulpreet Singh, Raymond Cunningh...
DSN
2002
IEEE
15 years 9 months ago
Pinpoint: Problem Determination in Large, Dynamic Internet Services
Traditional problem determination techniques rely on static dependency models that are difficult to generate accurately in today’s large, distributed, and dynamic application e...
Mike Y. Chen, Emre Kiciman, Eugene Fratkin, Armand...