Sciweavers

12301 search results - page 2264 / 2461
» Distributed Computation in Dynamic Networks
Sort
View
144
Voted
CN
2007
172views more  CN 2007»
15 years 3 months ago
Threshold cryptography in P2P and MANETs: The case of access control
Ad hoc groups, such as peer-to-peer (P2P) systems and mobile ad hoc networks (MANETs) represent recent technological advancements. They support low-cost, scalable and fault-tolera...
Nitesh Saxena, Gene Tsudik, Jeong Hyun Yi
JSW
2008
123views more  JSW 2008»
15 years 3 months ago
Component-oriented Reliability Analysis and Optimal Version-upgrade Problems for Open Source Software
The current software development environment has been changing into new development paradigms such as concurrent distributed development environment and the so-called open source p...
Yoshinobu Tamura, Shigeru Yamada
122
Voted
CN
1999
156views more  CN 1999»
15 years 3 months ago
Virtual reality movies-real-time streaming of 3D objects
Powerful servers for computation and storage, high-speed networking resources, and high-performance 3D graphics workstation, which are typically available in scientific research e...
Stephan Olbrich, Helmut Pralle
144
Voted
INFOCOM
2010
IEEE
15 years 1 months ago
PeopleRank: Social Opportunistic Forwarding
— In opportunistic networks, end-to-end paths between two communicating nodes are rarely available. In such situations, the nodes might still copy and forward messages to nodes t...
Abderrahmen Mtibaa, Martin May, Christophe Diot, M...
129
Voted
CDC
2010
IEEE
173views Control Systems» more  CDC 2010»
14 years 10 months ago
Corrective consensus: Converging to the exact average
Consensus algorithms provide an elegant distributed way for computing the average of a set of measurements across a sensor network. However, the convergence of the node estimates t...
Yin Chen, Roberto Tron, Andreas Terzis, René...
« Prev « First page 2264 / 2461 Last » Next »