Sciweavers

IWDC
2004
Springer
161views Communications» more  IWDC 2004»
13 years 10 months ago
Distributed Mobility Tracking for Ad Hoc Networks Based on an Autoregressive Model
Abstract. In ad hoc networks, node mobility causes the network topology to change dynamically over time, which complicates important tasks such as routing and flow control. We pro...
Zainab R. Zaidi, Brian L. Mark
IWDC
2004
Springer
13 years 10 months ago
Locating Objects in a Sensor Grid
Finding the location of an object, other than the sensor in a sensor network is an important problem. There is no good technique available in the literature to find the location o...
Buddhadeb Sau, Krishnendu Mukhopadhyaya
IWDC
2004
Springer
510views Communications» more  IWDC 2004»
13 years 10 months ago
On-Board RSVP: An Extension of RSVP to Support Real-Time Services in On-Board IP Networks
Abstract. The extension of Internet services to public transport passengers is slowly becoming inevitable. To this end, it is envisaged that high-speed local area networks will be ...
Muhammad Ali Malik, Salil S. Kanhere, Mahbub Hassa...
IWDC
2004
Springer
13 years 10 months ago
Reliability of VLSI Linear Arrays with Redundant Links
Reliability is one of the most important attributes of any system. Adding redundancy is one way to improve the reliability. In this paper, we consider linear VLSI arrays in which e...
Soumen Maity, Amiya Nayak, Bimal K. Roy
IWDC
2004
Springer
13 years 10 months ago
Performance of Fair Distributed Mutual Exclusion Algorithms
Kandarp Jani, Ajay D. Kshemkalyani
IWDC
2004
Springer
139views Communications» more  IWDC 2004»
13 years 10 months ago
Statistical Analysis of a P2P Query Graph Based on Degrees and Their Time-Evolution
Abstract. Despite their crucial impact on the performances of p2p systems, very few is known on peers behaviors in such networks. We propose here a study of these behaviors in a ru...
Jean-Loup Guillaume, Matthieu Latapy, Stevens Le-B...
IWDC
2004
Springer
156views Communications» more  IWDC 2004»
13 years 10 months ago
Agent-Based Distributed Intrusion Alert System
Intrusion detection for computer systems is a key problem in today’s networked society. Current distributed intrusion detection systems (IDSs) are not fully distributed as most o...
Arjita Ghosh, Sandip Sen
IWDC
2004
Springer
120views Communications» more  IWDC 2004»
13 years 10 months ago
SCIDS: A Soft Computing Intrusion Detection System
An Intrusion Detection System (IDS) is a program that analyzes what happens or has happened during an execution and tries to find indications that the computer has been misused. Th...
Ajith Abraham, Ravi Jain, Sugata Sanyal, Sang-Yong...
IWDC
2004
Springer
153views Communications» more  IWDC 2004»
13 years 10 months ago
APPLE: A Novel P2P Based e-Learning Environment
With the rapid development of information technology, dramatic changes have been taken place in the fundamental ways that people acquire and disseminate knowledge. Various e-Learni...
Hai Jin, Zuoning Yin, Xudong Yang, Fucheng Wang, J...