Sciweavers

2047 search results - page 256 / 410
» Pervasive Computing on Active Networks
Sort
View
INFOCOM
2002
IEEE
15 years 10 months ago
TCP Network Calculus: The case of large delay-bandwidth product
Abstract— We present in this paper an analytical model for the calculation of network load and drop probabilities in a TCP/IP network with general topology. First we formulate ou...
Eitan Altman, Konstantin Avrachenkov, Chadi Baraka...
ICDCS
1999
IEEE
15 years 9 months ago
Providing Support for Survivable CORBA Applications with the Immune System
The Immune system aimsto provide survivabilityto CORBA applications, enabling them to continue to operate despite malicious attacks, accidents, or faults. Every object within the ...
Priya Narasimhan, Kim Potter Kihlstrom, Louise E. ...
NDSS
2006
IEEE
15 years 11 months ago
Induced Churn as Shelter from Routing-Table Poisoning
Structured overlays are an important and powerful class of overlay networks that has emerged in recent years. They are typically targeted at peer-to-peer deployments involving mil...
Tyson Condie, Varun Kacholia, Sriram Sank, Joseph ...
ADHOCNETS
2010
Springer
15 years 1 months ago
DCLA: A Duty-Cycle Learning Algorithm for IEEE 802.15.4 Beacon-Enabled WSNs
The current specification for IEEE 802.15.4 beacon-enabled networks does not define how active and sleep schedules should be configured in order to achieve the optimal network perf...
Rodolfo de Paz Alberola, Dirk Pesch
SIGCOMM
2010
ACM
15 years 5 months ago
Fived: a service-based architecture implementation to innovate at the endpoints
Security functions such as access control, encryption and authentication are typically left up to applications on the modern Internet. There is no unified system to implement thes...
D. J. Capelis, Darrell D. E. Long