Sciweavers

1266 search results - page 22 / 254
» Threat Evaluation Method for Distributed Network Environment
Sort
View
IJVR
2007
100views more  IJVR 2007»
13 years 8 months ago
The Impact of Social Interaction on Usability for Distributed Virtual Environments
—Distance collaboration has long been a research area for distributed Virtual Environments (VEs). In these environments people interact with the technology and each other in a co...
Ilona Heldal
WOWMOM
2005
ACM
201views Multimedia» more  WOWMOM 2005»
14 years 1 months ago
Real-Time Intrusion Detection for Ad Hoc Networks
A mobile ad hoc network is a collection of nodes that is connected through a wireless medium forming rapidly changing topologies. The widely accepted existing routing protocols de...
Ioanna Stamouli, Patroklos G. Argyroudis, Hitesh T...
ICDS
2008
IEEE
14 years 2 months ago
A New Server Selection Strategy for Reliable Server Pooling in Widely Distributed Environments
In order to provide a generic, applicationindependent and resource-efficient framework for server redundancy and session failover, the IETF RSerPool WG is currently standardizing ...
Xing Zhou, Thomas Dreibholz, Erwin P. Rathgeb
JSSPP
2010
Springer
13 years 6 months ago
The Gain of Resource Delegation in Distributed Computing Environments
Abstract. In this paper, we address job scheduling in Distributed Computing Infrastructures, that is a loosely coupled network of autonomous acting High Performance Computing syste...
Alexander Fölling, Christian Grimme, Joachim ...
JSAC
2006
200views more  JSAC 2006»
13 years 8 months ago
A simple Cooperative diversity method based on network path selection
Cooperative diversity has been recently proposed as a way to form virtual antenna arrays that provide dramatic gains in slow fading wireless environments. However, most of the prop...
Aggelos Bletsas, Ashish Khisti, David P. Reed, And...