Sciweavers

1692 search results - page 158 / 339
» A Dynamic Network Interdiction Problem
Sort
View
132
Voted
ICDCS
1996
IEEE
15 years 8 months ago
Supporting a Flexible Parallel Programming Model on a Network of Workstations
We introduce a shared memory software prototype system for executing programs with nested parallelism on a network of workstations. This programming model exhibits a very convenie...
Shih-Chen Huang, Zvi M. Kedem
COMSWARE
2007
IEEE
15 years 10 months ago
Competition between SOM Clusters to Model User Authentication System in Computer Networks
—Traditional authentication systems employed on Internet are facing an acute problem of intrusions. In this context we propose a neural architecture for user authentication throu...
Shrijit S. Joshi, Vir V. Phoha
CANS
2007
Springer
154views Cryptology» more  CANS 2007»
15 years 10 months ago
Forward-Secure Key Evolution in Wireless Sensor Networks
We consider a key distribution scheme for securing node-to-node communication in sensor networks. While most schemes in use are based on random predistribution, we consider a syste...
Marek Klonowski, Miroslaw Kutylowski, Michal Ren, ...
142
Voted
UIC
2007
Springer
15 years 10 months ago
Context-Aware Service Composition for Mobile Network Environments
Recent advances in wireless and mobile networking technology pose a new set of requirements and challenges that are not previously thought of, when it comes to smart space middlewa...
Choonhwa Lee, Sunghoon Ko, Seungjae Lee, Wonjun Le...
151
Voted
RTSS
2005
IEEE
15 years 9 months ago
Enhanced EDF Scheduling Algorithms for Orchestrating Network-Wide Active Measurements
Monitoring network status such as end-to-end delay, jitter, and available bandwidth is important to support QoS-sensitive applications and timely detection of network anomalies li...
Prasad Calyam, Chang-Gun Lee, Phani Kumar Arava, D...