Sciweavers

1874 search results - page 276 / 375
» Network optimization for DHT-based applications
Sort
View
160
Voted
TSMC
2002
134views more  TSMC 2002»
15 years 3 months ago
Incorporating soft computing techniques into a probabilistic intrusion detection system
There are a lot of industrial applications that can be solved competitively by hard computing, while still requiring the tolerance for imprecision and uncertainty that can be explo...
Sung-Bae Cho
142
Voted
SAC
2008
ACM
15 years 3 months ago
Improving denial of service resistance using dynamic local adaptations
We improve the resistance of gossip-based multicast to (Distributed) Denial of Service (DoS) attacks using dynamic local adaptations at each node. Each node estimates the current ...
Gal Badishi, Idit Keidar
129
Voted
ICRA
2010
IEEE
130views Robotics» more  ICRA 2010»
15 years 2 months ago
Maintaining connectivity in environments with obstacles
Abstract— Robotic routers (mobile robots with wireless communication capabilities) can create an adaptive wireless network and provide communication services for mobile users ond...
Onur Tekdas, Patrick A. Plonski, Nikhil Karnad, Vo...
114
Voted
JSAC
2010
147views more  JSAC 2010»
15 years 2 months ago
Joint identity-message coding
In a significant class of sensor-network applications, the identities of the reporting sensors constitute the bulk of the communicated data, whereas the message itself can be as ...
Lorenzo Keller, Mahdi Jafari Siavoshani, Christina...
141
Voted
PVM
2010
Springer
15 years 1 months ago
Communication Target Selection for Replicated MPI Processes
Abstract. VolpexMPI is an MPI library designed for volunteer computing environments. In order to cope with the fundamental unreliability of these environments, VolpexMPI deploys tw...
Rakhi Anand, Edgar Gabriel, Jaspal Subhlok