Sciweavers

290 search results - page 40 / 58
» A Scalable, Ordered Scenario-Based Network Security Simulato...
Sort
View
ITIIS
2010
140views more  ITIIS 2010»
14 years 6 months ago
RGF: Receiver-based Greedy Forwarding for Energy Efficiency in Lossy Wireless Sensor Networks
Greedy forwarding is the key mechanism of geographic routing and is one of the protocols used most commonly in wireless sensor networks. Greedy forwarding uses 1-hop local informa...
In Hur, Moonseong Kim, Jaewan Seo, Hyunseung Choo
MASCOTS
2004
15 years 1 months ago
Routing in an Internet-Scale Network Emulator
One of the primary challenges facing scalable network emulation and simulation is the overhead of storing network-wide routing tables or computing appropriate routes on a per-pack...
Jay Chen, Diwaker Gupta, Kashi Venkatesh Vishwanat...
INFOCOM
2008
IEEE
15 years 6 months ago
BAKE: A Balanced Kautz Tree Structure for Peer-to-Peer Networks
Abstract—In order to improve scalability and reduce maintenance overhead for structured Peer-to-Peer systems, researchers design optimal architectures with constant degree and lo...
Deke Guo, Yunhao Liu, Xiang-Yang Li
OTM
2009
Springer
15 years 6 months ago
CLON: Overlay Networks and Gossip Protocols for Cloud Environments
Although epidemic or gossip-based multicast is a robust and scalable approach to reliable data dissemination, its inherent redundancy results in high resource consumption on both ...
Miguel Matos, António Sousa, José Pe...
ICDCS
2003
IEEE
15 years 5 months ago
An Integrated Resource Sharing Policy for Multimedia Storage Servers Based on Network-Attached Disks
In this paper, we propose using the network-attached disk (NAD) architecture to design highly scalable and cost-effective multimedia-on-demand (MOD) servers. In order to ensure en...
Nabil J. Sarhan, Chita R. Das