Sciweavers

1266 search results - page 69 / 254
» Threat Evaluation Method for Distributed Network Environment
Sort
View
GRC
2008
IEEE
15 years 5 months ago
Effects of Varying the Delay Distribution in Random, Scale-free, and Small-world Networks
Graph-theory-based approaches have been used with great success when analyzing abstract properties of natural and artificial networks. However, these approaches have not factored...
Bum Soon Jang, Timothy Mann, Yoonsuck Choe
IWCMC
2010
ACM
15 years 6 months ago
Decentralized service composition in pervasive computing environments
In a pervasive computing environment, the devices are embedded in the physical world, providing services and interconnected by a communication network. Composition of these servic...
Joanna Izabela Siebert, Jiannong Cao, Long Cheng, ...
CEC
2008
IEEE
15 years 10 months ago
Solving dynamic multi-objective problems with vector evaluated particle swarm optimisation
— Many optimisation problems are multi-objective and change dynamically. Many methods use a weighted average approach to the multiple objectives. This paper introduces the usage ...
Mardé Greeff, Andries Petrus Engelbrecht
CSREAPSC
2006
15 years 5 months ago
Distributed Pairwise Key Establishment in Wireless Sensor Networks
- Security is a big challenge when wireless sensor networks are deployed in a hostile environment. Due to the computational and storage overheads, traditional asymmetric-key based ...
Yi Cheng, Dharma P. Agrawal
LAWEB
2005
IEEE
15 years 9 months ago
A Latency-Based Object Placement Approach in Content Distribution Networks
Content Distribution Networks (CDNs) are increasingly being used to disseminate data in today's Internet aiming at reducing the load on the origin server and the traffic on t...
George Pallis, Athena Vakali, Konstantinos Stamos,...