Sciweavers

5675 search results - page 1083 / 1135
» Exploiting Chaos for Computation
Sort
View
110
Voted
DMSN
2004
ACM
15 years 6 months ago
Region streams: functional macroprogramming for sensor networks
Sensor networks present a number of novel programming challenges for application developers. Their inherent limitations of computational power, communication bandwidth, and energy...
Ryan Newton, Matt Welsh
100
Voted
IMC
2004
ACM
15 years 6 months ago
Robust synchronization of software clocks across the internet
Accurate, reliable timestamping which is also convenient and inexpensive is needed in many important areas including real-time network applications and network measurement. Recent...
Darryl Veitch, Satish Babu Korada, Attila Pá...
WMASH
2004
ACM
15 years 6 months ago
Smart edge server: beyond a wireless access point
Wireless access at cafes, airports, homes and businesses have proliferated all over the globe with several different Wireless Internet Service Providers. Similarly, digital media ...
Geetha Manjunath, Tajana Simunic, Venkatesh Krishn...
136
Voted
WWW
2004
ACM
15 years 6 months ago
Flexible on-device service object replication with replets
An increasingly large amount of such applications employ service objects such as Servlets to generate dynamic and personalized content. Existing caching infrastructures are not we...
Dong Zhou, Nayeem Islam, Ali Ismael
ADHOCNOW
2004
Springer
15 years 6 months ago
Weathering the Storm: Managing Redundancy and Security in Ad Hoc Networks
Many ad hoc routing algorithms rely on broadcast flooding for location discovery or more generally for secure routing applications, particularly when dealing with Byzantine threat...
Mike Burmester, Tri Van Le, Alec Yasinsac
« Prev « First page 1083 / 1135 Last » Next »