Sciweavers

12301 search results - page 2092 / 2461
» Distributed Computation in Dynamic Networks
Sort
View
PERCOM
2004
ACM
16 years 4 months ago
An Augmented Virtual Reality Interface for Assistive Monitoring of Smart Spaces
Large sensor networks in applications such as surveillance and virtual classrooms, have to deal with the explosion of sensor information. Coherent presentation of data coming from...
Shichao Ou, Deepak R. Karuppiah, Andrew H. Fagg, E...
P2P
2006
IEEE
121views Communications» more  P2P 2006»
15 years 10 months ago
The Orchard Algorithm: P2P Multicasting without Free-Riding
The main purpose of many current peer-to-peer (P2P) networks is off-line file sharing. However, a potentially very promising use of such networks is to share video streams (e.g.,...
Jan-David Mol, Dick H. J. Epema, Henk J. Sips
SIGCOMM
1996
ACM
15 years 9 months ago
Receiver-Driven Layered Multicast
State of the art, real-time, rate-adaptive, multimedia applications adjust their transmission rate to match the available network capacity. Unfortunately, this source-based rate-a...
Steven McCanne, Van Jacobson, Martin Vetterli
ICDE
2011
IEEE
244views Database» more  ICDE 2011»
14 years 8 months ago
Algorithms for local sensor synchronization
— In a wireless sensor network (WSN), each sensor monitors environmental parameters, and reports its readings to a base station, possibly through other nodes. A sensor works in c...
Lixing Wang, Yin Yang, Xin Miao, Dimitris Papadias...
ISI
2008
Springer
15 years 4 months ago
Real time intrusion prediction, detection and prevention programs
An Intrusion Detection Program (IDP) analyzes what happens or has happened during an execution and tries to find indications that the computer has been misused. In this talk, we p...
A. Abraham
« Prev « First page 2092 / 2461 Last » Next »