Sciweavers

229 search results - page 19 / 46
» Designing a Fault-Tolerant Network Using Valiant Load-Balanc...
Sort
View
78
Voted
DEBS
2008
ACM
14 years 11 months ago
Event-based constraints for sensornet programming
We propose a sensornet programming model based on declarative spatio-temporal constraints on events only, not sensors. Where previous approaches conflate events and sensors becaus...
Jie Mao, John Jannotti, Mert Akdere, Ugur Ç...
CF
2005
ACM
14 years 11 months ago
SPANIDS: a scalable network intrusion detection loadbalancer
Network intrusion detection systems (NIDS) are becoming an increasingly important security measure. With rapidly increasing network speeds, the capacity of the NIDS sensor can lim...
Lambert Schaelicke, Kyle Wheeler, Curt Freeland
MWCN
2004
Springer
15 years 3 months ago
Peer-to-Peer Based Architecture for Mobility Management in Wireless Networks
: Mobility management is an important task in wireless networks. The Mobile IP protocol provides a basic solution to the mobility management. However, Mobile IP suffers from severa...
Shou-Chih Lo, Wen-Tsuen Chen
108
Voted
WIOPT
2005
IEEE
15 years 3 months ago
Analysis of a Distributed Algorithm to Determine Multiple Routes with Path Diversity in Ad Hoc Networks
With multipath routing in mobile ad hoc networks (MANETs), a source can establish multiple routes to a destination for routing data. In MANETs, mulitpath routing can be used to pr...
Stephen Mueller, Dipak Ghosal
IWDC
2005
Springer
117views Communications» more  IWDC 2005»
15 years 3 months ago
Oasis: A Hierarchical EMST Based P2P Network
Peer-to-peer systems and applications are distributed systems without any centralized control. P2P systems form the basis of several applications, such as file sharing systems and ...
Pankaj Ghanshani, Tarun Bansal