Sciweavers

5234 search results - page 884 / 1047
» Simulation of Computer Network Attacks
Sort
View
139
Voted
JGAA
2006
127views more  JGAA 2006»
15 years 3 months ago
A New Algorithm for Finding Minimal Cycle-Breaking Sets of Turns in a Graph
We consider the problem of constructing a minimal cycle-breaking set of turns for a given undirected graph. This problem is important for deadlock-free wormhole routing in compute...
Lev B. Levitin, Mark G. Karpovsky, Mehmet Mustafa,...
ICDCSW
2008
IEEE
15 years 10 months ago
Towards Cyber-Physical Holodeck Systems Via Physically Rendered Environments (PRE's)
We present an early vision of a cyber-physical environment in which computer controlled rendering of physical surfaces, terrains, and environments is achieved by manipulating grid...
Veljko Krunic, Richard Han
177
Voted
HICSS
2003
IEEE
183views Biometrics» more  HICSS 2003»
15 years 9 months ago
CRMA: A Cycle-breaking Multicast Routing Algorithm for Supporting QoS over the Internet
Multicasting is an efficient and effective approach for supporting content distribution based on the current Internet infrastructure. In this paper, we have proposes the source-in...
Jian Zhao, Hossam S. Hassanein, Jieyi Wu, Junzhou ...
MOBIDE
1999
ACM
15 years 8 months ago
Data Partitioning for Disconnected Client Server Databases
The use of mobile computers is gaining popularity. The number of users with laptops and notebooks is increasing and this trend is likely to continue in the future where the number...
Shirish Hemant Phatak, B. R. Badrinath
182
Voted

Publication
158views
17 years 2 months ago
Fair Flow Control for ATM-ABR Multipoint Connections
Multipoint-to-multipoint communication can be implemented by combining the point-to-multipoint and multipoint-to-point connection algorithms. In an ATM multipoint-to-point connecti...
Sonia Fahmy, Raj Jain, Rohit Goyal, and Bobby Vand...