Sciweavers

2503 search results - page 335 / 501
» Building Computer Network Attacks
Sort
View
NCA
2005
IEEE
15 years 7 months ago
Location-based Publish/Subscribe
This paper introduces the concept of location-based publish/subscribe (LPS), which allows mobile ad hoc applications to anonymously communicate with each other, depending on their...
Patrick Th. Eugster, Benoît Garbinato, Adria...
AINA
2010
IEEE
15 years 6 months ago
Lightweight Policy-Based Management of Quality-Assured, Device-Based Service Systems
Intelligent connected devices become a more vital part of our lives. In contrast to prior years, today embedded systems and devices are loosely coupled and cooperate with each oth...
Oliver Dohndorf, Jan Krüger, Heiko Krumm, Chr...
ICDCSW
2002
IEEE
15 years 6 months ago
Toward a Peer-to-Peer Shared Virtual Reality
— This paper envisions a shared virtual reality system that could handle millions of users and objets. The SOLIPSIS system does not rely on servers and is based on a network of p...
Joaquín Keller, Gwendal Simon
HCW
1998
IEEE
15 years 6 months ago
Modular Heterogeneous System Development: A Critical Analysis of Java
Java supports heterogeneous applications by transforming a heterogeneous network of machines into a homogeneous network of Java virtual machines. This abstracts over many of the c...
Gul Agha, Mark Astley, Jamil A. Sheikh, Carlos A. ...
AINA
2004
IEEE
15 years 5 months ago
A Small IP Forwarding Table Using Hashing
As the demand for high bandwidth on the Internet increases, it is required to build next generation routers with the capability of forwarding multiple millions of packets per secon...
Yeim-Kuan Chang, Wen-Hsin Cheng