Sciweavers

832 search results - page 104 / 167
» Secure Node Discovery in Ad-hoc Networks and Applications
Sort
View
GRID
2004
Springer
15 years 4 months ago
From Sandbox to Playground: Dynamic Virtual Environments in the Grid
Much experience has been gained with the protocols and mechanisms needed for discovery and allocation of remote computational resources. However, the preparation of a remote compu...
Katarzyna Keahey, Karl Doering, Ian T. Foster
CLEIEJ
1998
134views more  CLEIEJ 1998»
14 years 11 months ago
Firewall Monitoring
Securing resources against unauthorized access and/or use is a major concern of every organization that uses computer networks. To protect internal networks from external attacks,...
Ernst L. Leiss, Jianyu You
IJITN
2010
177views more  IJITN 2010»
14 years 8 months ago
Real-Time Query Processing on Live Videos in Networks of Distributed Cameras
With the proliferation of inexpensive cameras and the availability of high-speed wired and wireless networks, systems of distributed cameras are becoming an enabling technology fo...
Rui Peng, Alexander J. Aved, Kien A. Hua
COORDINATION
2007
Springer
15 years 5 months ago
Fact Spaces: Coordination in the Face of Disconnection
Coordination languages for ad hoc networks with a fluid topology do not offer adequate support to detect and deal with device disconnection. Such a disconnection is particularly ...
Stijn Mostinckx, Christophe Scholliers, Eline Phil...
ICC
2000
IEEE
151views Communications» more  ICC 2000»
15 years 3 months ago
Channel-Hopping Multiple Access
— The medium-access control (MAC) protocols for wireless networks proposed or implemented to date based on collision-avoidance handshakes between sender and receiver either requi...
Asimakis Tzamaloukas, J. J. Garcia-Luna-Aceves