Sciweavers

1583 search results - page 239 / 317
» The Quorum Deployment Problem
Sort
View
JCM
2006
112views more  JCM 2006»
14 years 9 months ago
A Peer-to-Peer Cooperation Enhancement Scheme and its Performance Analysis
The performance of peer-to-peer systems depends on the level of cooperation of the system's participants. While most existing peer-to-peer architectures have assumed that user...
Wei-Cherng Liao, Fragkiskos Papadopoulos, Konstant...
JHSN
2006
95views more  JHSN 2006»
14 years 9 months ago
IPsec/VPN security policy correctness and assurance
: With IPSec/VPN policies being widely deployed, how to correctly specify and configure them is critical in enforcing security requirements. Under current practice, IPSec/VPN polic...
Yanyan Yang, Charles U. Martel, Zhi (Judy) Fu, Shy...
JHSN
2006
85views more  JHSN 2006»
14 years 9 months ago
A scalable intra-domain resource management architecture for DiffServ networks
With the rapid growth of the Internet into a global communication and commercial infrastructure, the need for Quality of Services (QoS) in the Internet becomes more and more import...
Haci A. Mantar, Ibrahim T. Okumus, Junseok Hwang, ...
JMM2
2006
111views more  JMM2 2006»
14 years 9 months ago
A Microscopic Telepathology System for Multiresolution Computer-Aided Diagnostics
The aim of the presented system is simplification and speedup of the daily pathological examination routine. The system combines telepathology with computer-aided diagnostics algor...
Grigory Begelman, Michael Pechuk, Ehud Rivlin, Edm...
JSAC
2006
183views more  JSAC 2006»
14 years 9 months ago
HiRLoc: high-resolution robust localization for wireless sensor networks
In this paper we address the problem of robustly estimating the position of randomly deployed nodes of a Wireless Sensor Network (WSN), in the presence of security threats. We prop...
Loukas Lazos, Radha Poovendran