Sciweavers

43264 search results - page 8293 / 8653
» Comparing models of computation
Sort
View
DC
2007
15 years 3 months ago
Randomized self-stabilizing and space optimal leader election under arbitrary scheduler on rings
We present a randomizedself-stabilizing leaderelection protocol and a randomizedself-stabilizing token circulation protocol under an arbitrary scheduler on anonymous and unidirect...
Joffroy Beauquier, Maria Gradinariu, Colette Johne...
JCM
2006
112views more  JCM 2006»
15 years 3 months ago
A Peer-to-Peer Cooperation Enhancement Scheme and its Performance Analysis
The performance of peer-to-peer systems depends on the level of cooperation of the system's participants. While most existing peer-to-peer architectures have assumed that user...
Wei-Cherng Liao, Fragkiskos Papadopoulos, Konstant...
JCM
2006
169views more  JCM 2006»
15 years 3 months ago
Trends in Middleware for Mobile Ad Hoc Networks
The use of middleware has extended from simply facilitating applications' communication to a broad set of services supporting a huge spectrum of networked and distributed comp...
Salem Hadim, Jameela Al-Jaroodi, Nader Mohamed
JCO
2006
67views more  JCO 2006»
15 years 3 months ago
Resource allocation for restoration of compromised systems
Computer systems are constantly under the threats of being attacked and in many cases these attacks succeed. Today's networked systems are thus built to be intrusion tolerant....
Qunwei Zheng, Sibabrata Ray, Xiaoyan Hong
JSW
2008
95views more  JSW 2008»
15 years 3 months ago
From Sensors to Assisted Driving - Bridging the Gap
Increasing traffic density enforces development of Advanced Driver Assistance Systems to cope with safety aspects. Such systems require serious amount of sensor data to deduce spat...
Marcus Tönnis, Jan-Gregor Fischer, Gudrun Kli...
« Prev « First page 8293 / 8653 Last » Next »