Sciweavers

8080 search results - page 380 / 1616
» From Computer Networks to Agent Networks
Sort
View
PODC
2003
ACM
15 years 10 months ago
Routing networks for distributed hash tables
Routing topologies for distributed hashing in peer-to-peer networks are classified into two categories: deterministic and randomized. A general technique for constructing determi...
Gurmeet Singh Manku
WAN
1998
Springer
15 years 9 months ago
Low Speed ATM over ADSL and the Need for High Speed Networks
The use of modern technology from non-standard sources allows IT centres to find temporary solutions for operational needs, for example to provide access quickly to a networking in...
Gerhard J. A. Schneider
ICC
2007
IEEE
254views Communications» more  ICC 2007»
15 years 8 months ago
Group Rekeying Schemes for Secure Group Communication in Wireless Sensor Networks
Wireless sensor networks are promising solutions for many applications. However, wireless sensor nodes suffer from many constraints such as low computation capability, small memory...
Yong Wang, Byrav Ramamurthy
141
Voted
APNOMS
2006
Springer
15 years 8 months ago
Detecting and Identifying Network Anomalies by Component Analysis
Many research works address detection and identification of network anomalies using traffic analysis. This paper considers large topologies, such as those of an ISP, with traffic a...
Le The Quyen, Marat Zhanikeev, Yoshiaki Tanaka
APNOMS
2006
Springer
15 years 8 months ago
Autonomic Management of Scalable Load-Balancing for Ubiquitous Networks
In ubiquitous networks, a lot of sensors and RFID readers will be connected to the networks as well as PCs and mobile phones are connected, and huge numbers of transactions are exp...
Toshio Tonouchi, Yasuyuki Beppu