Sciweavers

189 search results - page 30 / 38
» Maintaining Comprehensive Resource Availability in P2P Netwo...
Sort
View
IPPS
2007
IEEE
15 years 6 months ago
Security Threat Prediction in a Local Area Network Using Statistical Model
In today’s large and complex network scenario vulnerability scanners play a major role from security perspective by proactively identifying the known security problems or vulner...
Somak Bhattacharya, S. K. Ghosh
DASFAA
2006
IEEE
145views Database» more  DASFAA 2006»
15 years 5 months ago
Processing Multiple Aggregation Queries in Geo-Sensor Networks
Abstract. To process aggregation queries issued through different sensors as access points in sensor networks, existing algorithms handle queries independently and perform in-netw...
Ken C. K. Lee, Wang-Chien Lee, Baihua Zheng, Julia...
GLOBECOM
2006
IEEE
15 years 5 months ago
Coverage-Preserving Routing Protocols for Randomly Distributed Wireless Sensor Networks
— Sensing coverage is an important issue for sensor networks, since it is viewed as one of the critical measures of performance offered by a sensor network. The design of a routi...
Yuh-Ren Tsai
JCP
2006
110views more  JCP 2006»
14 years 11 months ago
Gateway Selection Review in Ad hoc Networks
The nature of wireless mobile ad hoc networks depend on batteries or other fatiguing means for their energy. A limited energy capacity may be the most significant performance const...
Tarek Sheltami
CN
2004
108views more  CN 2004»
14 years 11 months ago
Routing bandwidth-guaranteed paths with restoration in label-switched networks
Label switched networks have become increasingly attractive to both network providers and customers. By creating aggregate, bandwidth-reserved flows, these networks offer routing ...
Samphel Norden, Milind M. Buddhikot, Marcel Waldvo...