Sciweavers

1080 search results - page 155 / 216
» Distributed Hash Tables
Sort
View
TMC
2010
138views more  TMC 2010»
15 years 3 months ago
Reliable Anchor-Based Sensor Localization in Irregular Areas
—Localization is a fundamental problem in wireless sensor networks and its accuracy impacts the efficiency of location-aware protocols and applications, such as routing and stora...
Bin Xiao, Lin Chen, Qingjun Xiao, Minglu Li
CCGRID
2008
IEEE
15 years 11 months ago
Pastel: Bridging the Gap between Structured and Large-State Overlays
Peer-to-peer overlays envision a single overlay substrate that can be used (possibly simultaneously) by many applications, but current overlays either target fast, few-hop lookups...
Nuno Cruces, Rodrigo Rodrigues, Paulo Ferreira
IEEEPACT
2007
IEEE
15 years 11 months ago
Unified Architectural Support for Soft-Error Protection or Software Bug Detection
In this paper we propose a unified architectural support that can be used flexibly for either soft-error protection or software bug detection. Our approach is based on dynamically...
Martin Dimitrov, Huiyang Zhou
ACMACE
2006
ACM
15 years 11 months ago
Airhockey over a distance: a networked physical game to support social interactions
In modern society, people increasingly lack social interaction, even though it is beneficial to professional and personal life. Airhockey Over a Distance aims to work against this...
Florian Mueller, Luke Cole, Shannon O'Brien, Woute...
130
Voted
INFOSCALE
2006
ACM
15 years 11 months ago
Exploiting P2P systems for DDoS attacks
— When a P2P system has millions of concurrently active peers, there is the risk that it could serve as a DDoS engine for attacks against a targeted host. In this paper we descri...
Naoum Naoumov, Keith W. Ross