Sciweavers

3343 search results - page 268 / 669
» Network Objects
Sort
View
INFOCOM
2008
IEEE
15 years 10 months ago
Evaluating the Vulnerability of Network Mechanisms to Sophisticated DDoS Attacks
—The design of computer and communication systems has been based, for decades, on the fundamental assumption that the objective of all users is to improve their own performance. ...
Udi Ben-Porat, Anat Bremler-Barr, Hanoch Levy
ICDE
2005
IEEE
110views Database» more  ICDE 2005»
15 years 9 months ago
Locality Aware Networked Join Evaluation
We pose the question: how do we efficiently evaluate a join operator, distributed over a heterogeneous network? Our objective here is to optimize the delay of output tuples. We di...
Yanif Ahmad, Ugur Çetintemel, John Jannotti...
TPDS
2008
176views more  TPDS 2008»
15 years 4 months ago
Adaptive Data Collection Strategies for Lifetime-Constrained Wireless Sensor Networks
Communication is a primary source of energy consumption in wireless sensor networks. Due to resource constraints, the sensor nodes may not have enough energy to report every readin...
Xueyan Tang, Jianliang Xu
MOBIHOC
2004
ACM
16 years 3 months ago
Towards mobility as a network control primitive
In the near future, the advent of large-scale networks of mobile agents autonomously performing long-term sensing and communication tasks will be upon us. However, using controlle...
David Kiyoshi Goldenberg, Jie Lin, A. Stephen Mors...
WCNC
2010
IEEE
15 years 8 months ago
Transmit and Reserve (TAR): A Coordinated Channel Access for IEEE 802.11 Networks
—This paper considers the medium access problem in the IEEE 802.11 standard. Although the transmission bit rates have clearly increased, some MAC related problems remain unsolved...
Bachar Wehbi, Anis Laouiti, Ana R. Cavalli