Sciweavers

5234 search results - page 870 / 1047
» Simulation of Computer Network Attacks
Sort
View
162
Voted
CIKM
2007
Springer
15 years 10 months ago
Optimal proactive caching in peer-to-peer network: analysis and application
As a promising new technology with the unique properties like high efficiency, scalability and fault tolerance, Peer-toPeer (P2P) technology is used as the underlying network to b...
Weixiong Rao, Lei Chen 0002, Ada Wai-Chee Fu, Ying...
163
Voted
AINA
2005
IEEE
15 years 9 months ago
Sensor Inter-Vehicle Communication for Safer Highways
In this paper we present a sensor inter-vehicle communication protocol based on geographical routing. Sensors installed in cars continuously gather important information about: ai...
Mimoza Durresi, Arjan Durresi, Leonard Barolli
117
Voted
ACMSE
2004
ACM
15 years 9 months ago
A collaborative problem-solving framework for mobile devices
The explosive growth in the number of mobile devices such as Internet-enabled cellular phones, wireless handheld devices, wireless laptops, and tablet PCs has driven the correspon...
Stanislav Kurkovsky, Bhagyavati, Arris Ray
109
Voted
ISCAS
2007
IEEE
141views Hardware» more  ISCAS 2007»
15 years 10 months ago
Analog Emulation of a Reconfigurable Tap Changing Transformer
—Accurate analog models of power system components are required in order to realize an analog computation engine for power systems. Analog computation is an area of continued int...
Aaron St. Leger, Juan C. Jimenez, Agung Fu, Sanal ...
SPAA
1996
ACM
15 years 8 months ago
BSP vs LogP
A quantitative comparison of the BSP and LogP models of parallel computation is developed. We concentrate on a variant of LogP that disallows the so-called stalling behavior, alth...
Gianfranco Bilardi, Kieran T. Herley, Andrea Pietr...