Sciweavers

1246 search results - page 197 / 250
» Evaluation of an awareness distribution mechanism: A simulat...
Sort
View
ICNP
2009
IEEE
15 years 8 months ago
Topological Detection on Wormholes in Wireless Ad Hoc and Sensor Networks
—Wormhole attack is a severe threat to wireless ad hoc and sensor networks. Most existing countermeasures either require specialized hardware devices or make strong assumptions o...
Dezun Dong, Mo Li, Yunhao Liu, Xiang-Yang Li, Xian...
IPPS
2005
IEEE
15 years 7 months ago
On Constructing k-Connected k-Dominating Set in Wireless Networks
An important problem in wireless networks, such as wireless ad hoc and sensor networks, is to select a few nodes to form a virtual backbone that supports routing and other tasks s...
Fei Dai, Jie Wu
ICUMT
2009
14 years 11 months ago
Discovery of Physical Neighbors for P2P 3D streaming
Abstract-- Many peer-to-peer-based virtual environment (P2PVE) solutions have been proposed recently to improve the scalability of distributed virtual environment (VE) systems. By ...
Chang-Hua Wu, Shun-Yun Hu, Li-Ming Tseng
PVM
1998
Springer
15 years 5 months ago
SKaMPI: A Detailed, Accurate MPI Benchmark
Abstract. SKaMPI is a benchmark for MPI implementations. Its purpose is the detailed analysis of the runtime of individual MPI operations and comparison of these for di erent imple...
Ralf Reussner, Peter Sanders, Lutz Prechelt, Matth...
ICUMT
2009
14 years 11 months ago
A scalable based multicast model for P2P Conferencing applications
Multicast conferencing is a rapidly-growing area of Internet use. Audio, video and other media such as shared whiteboard data can be distributed efficiently between groups of confe...
Mourad Amad, Zahir Haddad, Lachemi Khenous, Kamal ...