Sciweavers

2139 search results - page 255 / 428
» Distributed computing and computer security education
Sort
View
WS
2005
ACM
15 years 8 months ago
Fully self-organized peer-to-peer key management for mobile ad hoc networks
Mobile ad hoc networks (MANETs) offer communication over a shared wireless channel without any pre-existing infrastructure. Forming peer-to-peer security associations in MANETs i...
Johann van der Merwe, Dawoud S. Dawoud, Stephen Mc...
VLDB
2004
ACM
100views Database» more  VLDB 2004»
15 years 8 months ago
Resilient Rights Protection for Sensor Streams
Today’s world of increasingly dynamic computing environments naturally results in more and more data being available as fast streams. Applications such as stock market analysis,...
Radu Sion, Mikhail J. Atallah, Sunil Prabhakar
111
Voted
CORR
2010
Springer
109views Education» more  CORR 2010»
15 years 3 months ago
Pairwise Optimal Discrete Coverage Control for Gossiping Robots
Abstract-- We propose distributed algorithms to automatically deploy a group of robotic agents and provide coverage of a discretized environment represented by a graph. The classic...
Joseph W. Durham, Ruggero Carli, Francesco Bullo
CORR
2008
Springer
104views Education» more  CORR 2008»
15 years 3 months ago
A Recommender System based on Idiotypic Artificial Immune Networks
Abstract-The immune system is a complex biological system with a highly distributed, adaptive and selforganising nature. This paper presents an Artificial Immune System (AIS) that ...
Steve Cayzer, Uwe Aickelin
119
Voted
CORR
2010
Springer
146views Education» more  CORR 2010»
15 years 3 months ago
Modified Bully Algorithm using Election Commission
-- Electing leader is a vital issue not only in distributed computing but also in communication network [1, 2, 3, 4, 5], centralized mutual exclusion algorithm [6, 7], centralized ...
Muhammad Mahbubur Rahman, Afroza Nahar