Sciweavers

5234 search results - page 972 / 1047
» Simulation of Computer Network Attacks
Sort
View
ITICSE
2003
ACM
15 years 8 months ago
HTTPExplorer: exploring the hypertext transfer protocol
This paper presents HTTPExplorer, an interactive tool to explore the Hypertext Transfer Protocol. The intention is to use the tool in a course on web-based applications to support...
Volker Turau
ICCSA
2010
Springer
15 years 8 months ago
Geospatial Analysis of Cooperative Works on Asymmetric Information Environment
In the so-called Information-Explosion Era, astronomical amount of information is ubiquitously produced and digitally stored. It is getting more and more convenient for cooperative...
Tetsuya Kusuda, Tetsuro Ogi
CCECE
2009
IEEE
15 years 8 months ago
Cluster head selection using RF signal strength
The LEACH algorithm for selecting cluster heads is a probabilistic method which produces clusters with a large variation of link distances and uneven energy consumption during the...
Scott Fazackerley, Alan Paeth, Ramon Lawrence
ICDCS
2002
IEEE
15 years 8 months ago
Bidding for Storage Space in a Peer-to-Peer Data Preservation System
Digital archives protect important data collections from failures by making multiple copies at other archives, so that there are always several good copies of a collection. In a c...
Brian F. Cooper, Hector Garcia-Molina
DCOSS
2009
Springer
15 years 7 months ago
Local Construction of Spanners in the 3-D Space
Abstract. In this paper we present local distributed algorithms for constructing spanners in wireless sensor networks modeled as unit ball graphs (shortly UBGs) and quasi-unit ball...
Iyad A. Kanj, Ge Xia, Fenghui Zhang