Sciweavers

1266 search results - page 31 / 254
» Threat Evaluation Method for Distributed Network Environment
Sort
View
NETGAMES
2004
ACM
15 years 9 months ago
Scalable peer-to-peer networked virtual environment
We propose a fully-distributed peer-to-peer architecture to solve the scalability problem of Networked Virtual Environment in a simple and efficient manner. Our method exploits lo...
Shun-Yun Hu, Guan-Ming Liao
CW
2004
IEEE
15 years 7 months ago
Peer-to-Peer Networked Field-type Virtual Environment by Using AtoZ
This paper aims to study how to gain the consistency of the state in a DVE (Distributed Virtual Environment) with lag, under the condition of peer-to-peer architecture. That is, w...
Tatsuhiro Yonekura, Yoshihiro Kawano, Dai Hanawa
MOBIHOC
2005
ACM
16 years 3 months ago
Toward resilient security in wireless sensor networks
Node compromise poses severe security threats in wireless sensor networks. Unfortunately, existing security designs can address only a small, fixed threshold number of compromised...
Hao Yang, Fan Ye, Yuan Yuan, Songwu Lu, William A....
119
Voted
WWW
2004
ACM
16 years 4 months ago
A method for transparent admission control and request scheduling in e-commerce web sites
This paper presents a method for admission control and request scheduling for multiply-tiered e-commerce Web sites, achieving both stable behavior during overload and improved res...
Sameh Elnikety, Erich M. Nahum, John M. Tracey, Wi...
TRIDENTCOM
2010
IEEE
15 years 1 months ago
Managing Distributed Applications Using Gush
Deploying and controlling experiments running on a distributed set of resources is a challenging task. Software developers often spend a significant amount of time dealing with the...
Jeannie Albrecht, Danny Yuxing Huang