Sciweavers

1692 search results - page 137 / 339
» Practical, distributed network coordinates
Sort
View
ADHOCNETS
2009
Springer
15 years 9 months ago
DHT-Based Detection of Node Clone in Wireless Sensor Networks
Abstract. Wireless sensor networks are vulnerable to the node clone attack because of low-cost, resource-constrained sensor nodes, and uncontrolled environments where they are left...
Zhijun Li, Guang Gong
WWW
2010
ACM
15 years 10 months ago
Mind the data skew: distributed inferencing by speeddating in elastic regions
Semantic Web data exhibits very skewed frequency distributions among terms. Efficient large-scale distributed reasoning methods should maintain load-balance in the face of such hi...
Spyros Kotoulas, Eyal Oren, Frank van Harmelen
IPPS
2002
IEEE
15 years 8 months ago
Enforcing Resource Sharing Agreements among Distributed Server Clusters
Future scalable, high throughput, and high performance applications are likely to execute on platforms constructed by clustering multiple autonomous distributed servers, with reso...
Tao Zhao, Vijay Karamcheti
PODC
2005
ACM
15 years 8 months ago
Stochastic analysis of distributed deadlock scheduling
Deadlock detection scheduling is an important, yet oft-overlooked problem that can significantly affect the overall performance of deadlock handling. An excessive initiation of ...
Shigang Chen, Yibei Ling
ICC
2008
IEEE
127views Communications» more  ICC 2008»
15 years 9 months ago
Delay Analysis of Distributed Reservation Protocol with UWB Shadowing Channel for WPAN
— Ultra-wideband (UWB) technology is expected to provide high data rate services for future wireless personal area networks (WPANs). The WiMedia Alliance recently has launched it...
Kuang-Hao Liu, Xuemin Shen, Ruonan Zhang, Lin Cai