Sciweavers

2349 search results - page 126 / 470
» Performing time-sensitive network experiments
Sort
View
VLDB
2007
ACM
105views Database» more  VLDB 2007»
15 years 10 months ago
Using a distributed quadtree index in peer-to-peer networks
Abstract Peer-to-peer (P2P) networks have become a powerful means for online data exchange. Currently, users are primarily utilizing these networks to perform exact-match queries a...
Egemen Tanin, Aaron Harwood, Hanan Samet
IEEEIAS
2009
IEEE
15 years 4 months ago
Network Security Situation Awareness Using Exponential and Logarithmic Analysis
: Network security situation awareness (NSSA) is a hotspot in the network security research field, and it’s the perception, comprehension, and forecast of network security situat...
Xiaobin Tan, Qin Guihong, Zhang Yong, Liang Ping
ADHOCNOW
2003
Springer
15 years 3 months ago
Resisting Malicious Packet Dropping in Wireless Ad Hoc Networks
Most of the routing protocols in wireless ad hoc networks, such as DSR, assume nodes are trustworthy and cooperative. This assumption renders wireless ad hoc networks vulnerable to...
Mike Just, Evangelos Kranakis, Tao Wan
DASFAA
2006
IEEE
174views Database» more  DASFAA 2006»
15 years 1 months ago
Communication-Efficient Implementation of Range-Joins in Sensor Networks
Sensor networks are multi-hop wireless networks of resource constrained sensor nodes used to realize high-level collaborative sensing tasks. To query and access data generated and ...
Aditi Pandit, Himanshu Gupta
DSD
2006
IEEE
120views Hardware» more  DSD 2006»
15 years 4 months ago
Adaptive Power Management for the On-Chip Communication Network
— An on-chip communication network is most power efficient when it operates just below the saturation point. For any given traffic load the network can be operated in this regi...
Guang Liang, Axel Jantsch