Sciweavers

7683 search results - page 202 / 1537
» Distributed Computing with the CLAN Network
Sort
View
152
Voted
ISF
2008
114views more  ISF 2008»
15 years 3 months ago
An OVAL-based active vulnerability assessment system for enterprise computer networks
Abstract Many security problems are caused by vulnerabilities hidden in enterprise computer networks. It is very important for system administrators to have knowledge about the sec...
Xiuzhen Chen, Qinghua Zheng, Xiaohong Guan
130
Voted
MOBICOM
2006
ACM
15 years 9 months ago
Enabling distributed throughput maximization in wireless mesh networks: a partitioning approach
This paper considers the interaction between channel assignment and distributed scheduling in multi-channel multiradio Wireless Mesh Networks (WMNs). Recently, a number of distrib...
Andrew Brzezinski, Gil Zussman, Eytan Modiano
124
Voted
IPTPS
2004
Springer
15 years 9 months ago
Robust Distributed Name Service
This paper suggests a method called Trust-but-Verify that may turn DHT-based peer-to-peer systems into systems that are provably robust against even massive adversarial attacks.
Baruch Awerbuch, Christian Scheideler
121
Voted
IPSN
2010
Springer
15 years 10 months ago
A system for distributed event detection in wireless sensor networks
Event detection is a major issue for applications of wireless sensor networks. In order to detect an event, a sensor network has to identify which application-specific incident h...
Georg Wittenburg, Norman Dziengel, Christian Warte...
163
Voted
ICDCS
2008
IEEE
15 years 10 months ago
DCAR: Distributed Coding-Aware Routing in Wireless Networks
—Recently, there has been a growing interest of using network coding to improve the performance of wireless networks, for example, authors of [1] proposed the practical wireless ...
Jilin Le, John C. S. Lui, Dah-Ming Chiu