Sciweavers

8493 search results - page 1416 / 1699
» Implementing a distributed firewall
Sort
View
143
Voted
CORR
2010
Springer
173views Education» more  CORR 2010»
15 years 3 months ago
An Approach to Ad hoc Cloud Computing
We consider how underused computing resources within an enterprise may be harnessed to improve utilization and create an elastic computing infrastructure. Most current cloud provi...
Graham N. C. Kirby, Alan Dearle, Angus Macdonald, ...
IOR
2008
113views more  IOR 2008»
15 years 3 months ago
Finding Supply Function Equilibria with Asymmetric Firms
Abstract Firms compete in supply functions when they offer a schedule of prices and quantities into a market; for example, this occurs in many wholesale electricity markets. We stu...
Edward J. Anderson, Xinmin Hu
INFOCOM
2010
IEEE
15 years 3 months ago
Routing Primitives for Wireless Mesh Networks: Design, Analysis and Experiments
—In this paper, we consider routing in multi-hop wireless mesh networks. We analyze three standardized and commonly deployed routing mechanisms that we term “nodepair discovery...
Stanislav Miskovic, Edward W. Knightly
INFOCOM
2010
IEEE
15 years 3 months ago
Topological Properties Affect the Power of Network Coding in Decentralized Broadcast
—There exists a certain level of ambiguity regarding whether network coding can further improve download performance in P2P content distribution systems, as compared to commonly ...
Di Niu, Baochun Li
INFOCOM
2010
IEEE
15 years 3 months ago
VBS: Maximum Lifetime Sleep Scheduling for Wireless Sensor Networks Using Virtual Backbones
—Wireless sensor network (WSN) applications require redundant sensors to guarantee fault tolerance. However, the same degree of redundancy is not necessary for multi-hop communic...
Yaxiong Zhao, Jie Wu, Feng Li, Sanglu Lu
« Prev « First page 1416 / 1699 Last » Next »