Sciweavers

5234 search results - page 878 / 1047
» Simulation of Computer Network Attacks
Sort
View
COMCOM
2006
75views more  COMCOM 2006»
15 years 3 months ago
Finding a least hop(s) path subject to multiple additive constraints
In this paper, for the purpose of saving network resources, we first introduce and investigate a new problem referred to as the least hop(s) multiple additively constrained path (...
Gang Cheng, Nirwan Ansari
COMCOM
2007
119views more  COMCOM 2007»
15 years 3 months ago
A new high rate adaptive wireless data dissemination scheme
With the increasing popularity of wireless networks and mobile computing, data broadcasting has emerged as an efficient way of delivering data to mobile clients having a high degr...
Petros Nicopolitidis, Georgios I. Papadimitriou, M...
FGCS
2002
89views more  FGCS 2002»
15 years 3 months ago
The Legion support for advanced parameter-space studies on a grid
Parameter-space studies involve running a single application several times with different parameter sets. Since the jobs are mutually independent, many computing resources can be r...
Anand Natrajan, Marty A. Humphrey, Andrew S. Grims...
TCSV
2010
14 years 10 months ago
Distributed Media-Aware Rate Allocation for Wireless Video Streaming
This paper addresses the rate allocation problem for wireless video streaming. Results from a simple subjective viewing test indicate that perceptually preferred allocation can be...
Xiaoqing Zhu, Bernd Girod
ICDCN
2011
Springer
14 years 7 months ago
Scheduling Randomly-Deployed Heterogeneous Video Sensor Nodes for Reduced Intrusion Detection Time
This paper proposes to use video sensor nodes to provide an efficient intrusion detection system. We use a scheduling mechanism that takes into account the criticality of the surve...
Congduc Pham