Sciweavers

2503 search results - page 283 / 501
» Building Computer Network Attacks
Sort
View
CORR
2004
Springer
147views Education» more  CORR 2004»
15 years 1 months ago
Using Wireless Sensor Networks to Narrow the Gap between Low-Level Information and Context-Awareness
Wireless sensor networks are finally becoming a reality. In this paper, we present a scalable architecture for using wireless sensor networks in combination with wireless Ethernet...
Ioan Raicu, Owen Richter, Loren Schwiebert, Sheral...
95
Voted
ICPADS
2007
IEEE
15 years 8 months ago
A forwarding model for Voronoi-based Overlay Network
One recent approach to build highly scalable and robust networked virtual environments (NVEs) is by using peer-to-peer overlay networks. Voronoi-based Overlay Network (VON) has be...
Jui-Fa Chen, Wei-Chuan Lin, Tsu-Han Chen, Shun-Yun...
GCC
2005
Springer
15 years 7 months ago
A Topology Adaptation Protocol for Structured Superpeer Overlay Construction
Peer-to-peer networks can be divided into structured and unstructured based on their overlay topologies. In reality, unstructured p2p networks with superpeers have proved their cap...
Changyong Niu, Jian Wang, Ruimin Shen
127
Voted
PODC
2011
ACM
14 years 4 months ago
Structuring unreliable radio networks
In this paper we study the problem of building a connected dominating set with constant degree (CCDS) in the dual graph radio network model [4,9,10]. This model includes two types...
Keren Censor-Hillel, Seth Gilbert, Fabian Kuhn, Na...
140
Voted
AINA
2004
IEEE
15 years 5 months ago
A Web-Based Dual Mode Virtual Laboratory Supporting Cooperative Learning
This paper suggests the solution to build a Full Virtual Reality Learning Environment, and we have built both virtual and real laboratories on the web, in which students practice ...
Yu Lung Wu, Te Yi Chan, Bin Shyan Jong, Tsong Wuu ...