Sciweavers

2009 search results - page 127 / 402
» Towards Self-Configuring Networks
Sort
View
WORM
2004
14 years 3 days ago
Toward understanding distributed blackhole placement
The monitoring of unused Internet address space has been shown to be an effective method for characterizing Internet threats including Internet worms and DDOS attacks. Because the...
Evan Cooke, Michael Bailey, Zhuoqing Morley Mao, D...
SIAMSC
2008
126views more  SIAMSC 2008»
13 years 10 months ago
Towards a Statistical Theory of Texture Evolution in Polycrystals
Abstract. Most technologically useful materials possess polycrystalline microstructures composed of a large number of small monocrystalline grains separated by grain boundaries. Th...
K. Barmak, M. Emelianenko, Dmitry Golovaty, David ...
MOBIWAC
2006
ACM
14 years 4 months ago
Sink mobility protocols for data collection in wireless sensor networks
In wireless sensor networks data propagation is usually performed by sensors transmitting data towards a static control center (sink). Inspired by important applications (mostly r...
Ioannis Chatzigiannakis, Athanasios Kinalis, Sotir...
IFIP8
2004
14 years 4 days ago
Using Group Management to Tame Mobile Ad Hoc Networks
Mobile ad hoc networks (MANET) offer a convenient basis towards pervasive computing, due to inherent support for anytime, anywhere network access for mobile users. However, the dev...
Malika Boulkenafed, Daniele Sacchetti, Valé...
MICRO
2006
IEEE
155views Hardware» more  MICRO 2006»
14 years 4 months ago
In-Network Cache Coherence
With the trend towards increasing number of processor cores in future chip architectures, scalable directory-based protocols for maintaining cache coherence will be needed. Howeve...
Noel Eisley, Li-Shiuan Peh, Li Shang