Sciweavers

2047 search results - page 192 / 410
» Pervasive Computing on Active Networks
Sort
View
IPTPS
2004
Springer
15 years 10 months ago
Cluster Computing on the Fly: P2P Scheduling of Idle Cycles in the Internet
— Peer-to-peer computing, the harnessing of idle compute cycles throughout the Internet, offers exciting new research challenges in the converging domains of networking and distr...
Virginia Mary Lo, Daniel Zappala, Dayi Zhou, Yuhon...
WWW
2003
ACM
16 years 5 months ago
Dynamic service reconfiguration for wireless web access
This paper describes a dynamic service reconfiguration model where the proxy is composed of a chain of service objects called mobilets (pronounced as mo-be-lets), which can be dep...
Siu Nam Chuang, Alvin T. S. Chan, Jiannong Cao, Ro...
157
Voted
CORR
2010
Springer
110views Education» more  CORR 2010»
15 years 4 months ago
(Unconditional) Secure Multiparty Computation with Man-in-the-middle Attacks
In secure multi-party computation n parties jointly evaluate an n-variate function f in the presence of an adversary which can corrupt up till t parties. All honest parties are req...
Shailesh Vaya
IJSNET
2006
145views more  IJSNET 2006»
15 years 4 months ago
RL-MAC: a reinforcement learning based MAC protocol for wireless sensor networks
:This paper introduces RL-MAC, a novel adaptive MediaAccess Control (MAC) protocol for Wireless Sensor Networks (WSN) that employs a reinforcement learning framework. Existing sche...
Zhenzhen Liu, Itamar Elhanany
151
Voted
AINA
2005
IEEE
15 years 10 months ago
Bandwidth Fragmentation Avoided QoS Multicast Routing by Employing Admission Control
—The rapid growth of multimedia group-based applications motivates research into QoS guaranteed multicast network. In the multicast network carrying traffics of different QoS req...
Bo Rong, Maria Bennani, Michel Kadoch, Ahmed K. El...