Sciweavers

1707 search results - page 273 / 342
» Clustering Protocol for Sensor Networks
Sort
View
WORM
2004
14 years 11 months ago
Toward understanding distributed blackhole placement
The monitoring of unused Internet address space has been shown to be an effective method for characterizing Internet threats including Internet worms and DDOS attacks. Because the...
Evan Cooke, Michael Bailey, Zhuoqing Morley Mao, D...
INFOCOM
2011
IEEE
14 years 1 months ago
Throughput and delay scaling of general cognitive networks
—There has been recent interest within the networking research community to understand how performance scales in cognitive networks with overlapping n primary nodes and m seconda...
Wentao Huang, Xinbing Wang
IPPS
2008
IEEE
15 years 4 months ago
An MPI tool for automatically discovering the switch level topologies of Ethernet clusters
We present an MPI topology discovery tool for homogeneous Ethernet switched clusters. Unlike existing Ethernet topology discovery methods that rely on Simple Network Management Pr...
Joshua Lawrence, Xin Yuan
CLUSTER
2003
IEEE
15 years 3 months ago
Coordinated Checkpoint versus Message Log for Fault Tolerant MPI
— Large Clusters, high availability clusters and Grid deployments often suffer from network, node or operating system faults and thus require the use of fault tolerant programmin...
Aurelien Bouteiller, Pierre Lemarinier, Gér...
TRIDENTCOM
2010
IEEE
14 years 7 months ago
From Kansei to KanseiGenie: Architecture of Federated, Programmable Wireless Sensor Fabrics
Abstract. This paper deals with challenges in federating wireless sensing fabrics. Federations of this sort are currently being developed in next generation global end-to-end exper...
Mukundan Sridharan, Wenjie Zeng, William Leal, Xi ...