Sciweavers

5234 search results - page 970 / 1047
» Simulation of Computer Network Attacks
Sort
View
LADC
2007
Springer
15 years 9 months ago
Gossiping: Adaptive and Reliable Broadcasting in MANETs
Given the frequent topology changes in Mobile Ad Hoc Networks (MANET), the choice of appropriate broadcasting techniques is crucial to ensure reliable delivery of messages. The spr...
Abdelmajid Khelil, Neeraj Suri
ICDCSW
2006
IEEE
15 years 9 months ago
Improve Searching by Reinforcement Learning in Unstructured P2Ps
— Existing searching schemes in unstructured P2Ps can be categorized as either blind or informed. The quality of query results in blind schemes is low. Informed schemes use simpl...
Xiuqi Li, Jie Wu
ICDCSW
2006
IEEE
15 years 9 months ago
Fault-Tolerance Verification of the Fluids and Combustion Facility of the International Space Station
The Fluids and Combustion Facility (FCF) will be a permanent modular, multi-user facility used to accommodate microgravity science experiments in the U.S. Laboratory Module onboar...
Raquel S. Whittlesey-Harris, Mikhail Nesterenko
ISPDC
2006
IEEE
15 years 9 months ago
How to Achieve High Throughput with Dynamic Tree-Structured Coterie
Data replication permits a better network bandwidth utilization and minimizes the effect of latency in large-scale systems such as computing grids. However, the cost of maintainin...
Ivan Frain, Abdelaziz Mzoughi, Jean Paul Bahsoun
QEST
2006
IEEE
15 years 9 months ago
Modeling Fiber Delay Loops in an All Optical Switch
We analyze the effect of a few fiber delay loops on the number of deflections in an all optical packet switch. The switch is based on the ROMEO architecture developed by Alcatel...
Ana Busic, Mouad Ben Mamoun, Jean-Michel Fourneau