Sciweavers

6192 search results - page 1044 / 1239
» Distributed Control of Attention
Sort
View
137
Voted
ICDCSW
2003
IEEE
15 years 9 months ago
LHAP: A Lightweight Hop-by-Hop Authentication Protocol for Ad-Hoc Networks
Most ad hoc networks do not implement any network access control, leaving these networks vulnerable to resource consumption attacks where a malicious node injects packets into the...
Sencun Zhu, Shouhuai Xu, Sanjeev Setia, Sushil Jaj...
ICRA
2003
IEEE
146views Robotics» more  ICRA 2003»
15 years 9 months ago
Dispersion behaviors for a team of multiple miniature robots
To safely and efficiently guide search and rescue operations in disaster areas, gathering of relevant information such as the locations of victims, must occur swiftly. Using the c...
Janice L. Pearce, Paul E. Rybski, Sascha Stoeter, ...
INFOCOM
2003
IEEE
15 years 9 months ago
YAPPERS: A Peer-to-Peer Lookup Service over Arbitrary Topology
— Existing peer-to-peer search networks generally fall into two categories: Gnutella-style systems that use arbitrary topology and rely on controlled flooding for search, and sy...
Prasanna Ganesan, Qixiang Sun, Hector Garcia-Molin...
ISCC
2003
IEEE
122views Communications» more  ISCC 2003»
15 years 9 months ago
AMCA: an Active-based Multicast Congestion Avoidance Algorithm
Many works have recently addressed the issue of congestion control for multicast communications and the problem is known to be highly complex. Scalability, responsiveness, stabili...
Moufida Maimour, CongDuc Pham
ISORC
2003
IEEE
15 years 9 months ago
A Dynamic Shadow Approach for Mobile Agents to Survive Crash Failures
Fault tolerance schemes for mobile agents to survive agent server crash failures are complex since developers normally have no control over remote agent servers. Some solutions mo...
Simon Pears, Jie Xu, Cornelia Boldyreff
« Prev « First page 1044 / 1239 Last » Next »