Sciweavers

1266 search results - page 60 / 254
» Threat Evaluation Method for Distributed Network Environment
Sort
View
NETGAMES
2006
ACM
15 years 10 months ago
Count down protocol: asynchronous consistent protocol in P2P virtual ball game
This paper studies a way to improve consistency of states in a ball game typed DVE with lag, in P2P architecture. We also study how to control shared objects in real-time in a ser...
Yoshihiro Kawano, Tatsuhiro Yonekura
ICDCS
1998
IEEE
15 years 8 months ago
Optimal Channel Allocation for Data Dissemination in Mobile Computing Environments
This paper discusses wireless channel allocation problem for data dissemination in mobile computing systems. Methods for accessing data through broadcast and on-demand channels ar...
Qinglong Hu, Dik Lun Lee, Wang-Chien Lee
139
Voted
GECCO
2006
Springer
182views Optimization» more  GECCO 2006»
15 years 7 months ago
Distributed genetic algorithm for energy-efficient resource management in sensor networks
In this work we consider energy-efficient resource management in an environment monitoring and hazard detection sensor network. Our goal is to allocate different detection methods...
Qinru Qiu, Qing Wu, Daniel J. Burns, Douglas Holzh...
GLOBECOM
2009
IEEE
15 years 11 months ago
On the Connectivity of Key-Distribution Strategies in Wireless Sensor Networks
Abstract—Wireless sensor networks (WSNs) are usually missioned to gather critical information in hostile and adversarial environments, which make them susceptible to compromise a...
Hosein Shafiei, Ahmad Khonsari, Mohammad Sadegh Ta...
ICNP
2007
IEEE
15 years 10 months ago
Design and Implementation of Cross-Domain Cooperative Firewall
Security and privacy are two major concerns in supporting roaming users across administrative domains. In current practices, a roaming user often uses encrypted tunnels, e.g., Virt...
Jerry Cheng, Hao Yang, Starsky H. Y. Wong, Petros ...