Sciweavers

1748 search results - page 216 / 350
» Security Models for Heterogeneous Networking
Sort
View
ICC
2007
IEEE
143views Communications» more  ICC 2007»
15 years 10 months ago
Application-Aware Topology Formation Algorithm for Peer-to-Peer Networks
—When constructing an unstructured P2P topology, one should consider the application running on top of it in order to achieve a good performance for the whole P2P system. It is n...
Kin Wah Kwong, Danny H. K. Tsang
ICN
2007
Springer
15 years 10 months ago
Energy Efficiency in the Mobile Ad Hoc Networking Approach to Monitoring Farm Animals
—Using Mobile Ad Hoc Networks (MANETs) for monitoring bovine animals potentially offers high increase in the profitability of cattle production. In this paper we propose a formal...
Bartosz Wietrzyk, Milena Radenkovic
ANSS
2005
IEEE
15 years 9 months ago
Performance Preserving Network Downscaling
The Internet is a large, complex, heterogeneous system operating at very high speeds and consisting of a large number of users. Researchers use a suite of tools and techniques in ...
Fragkiskos Papadopoulos, Konstantinos Psounis, Ram...
JCM
2006
169views more  JCM 2006»
15 years 3 months ago
Trends in Middleware for Mobile Ad Hoc Networks
The use of middleware has extended from simply facilitating applications' communication to a broad set of services supporting a huge spectrum of networked and distributed comp...
Salem Hadim, Jameela Al-Jaroodi, Nader Mohamed
TELSYS
2010
122views more  TELSYS 2010»
15 years 2 months ago
Transmission scheduling for multi-homed transport protocols with network failure tolerance
In heterogeneous network environments, the network connections of a multi-homed device may have significant bandwidth differential. For a multihomed transmission protocol designed ...
Yuansong Qiao, Enda Fallon, John Murphy, Liam Murp...