Sciweavers

1266 search results - page 22 / 254
» Threat Evaluation Method for Distributed Network Environment
Sort
View
IJVR
2007
100views more  IJVR 2007»
14 years 11 months ago
The Impact of Social Interaction on Usability for Distributed Virtual Environments
—Distance collaboration has long been a research area for distributed Virtual Environments (VEs). In these environments people interact with the technology and each other in a co...
Ilona Heldal
WOWMOM
2005
ACM
201views Multimedia» more  WOWMOM 2005»
15 years 5 months ago
Real-Time Intrusion Detection for Ad Hoc Networks
A mobile ad hoc network is a collection of nodes that is connected through a wireless medium forming rapidly changing topologies. The widely accepted existing routing protocols de...
Ioanna Stamouli, Patroklos G. Argyroudis, Hitesh T...
ICDS
2008
IEEE
15 years 6 months ago
A New Server Selection Strategy for Reliable Server Pooling in Widely Distributed Environments
In order to provide a generic, applicationindependent and resource-efficient framework for server redundancy and session failover, the IETF RSerPool WG is currently standardizing ...
Xing Zhou, Thomas Dreibholz, Erwin P. Rathgeb
JSSPP
2010
Springer
14 years 9 months ago
The Gain of Resource Delegation in Distributed Computing Environments
Abstract. In this paper, we address job scheduling in Distributed Computing Infrastructures, that is a loosely coupled network of autonomous acting High Performance Computing syste...
Alexander Fölling, Christian Grimme, Joachim ...
JSAC
2006
200views more  JSAC 2006»
14 years 11 months ago
A simple Cooperative diversity method based on network path selection
Cooperative diversity has been recently proposed as a way to form virtual antenna arrays that provide dramatic gains in slow fading wireless environments. However, most of the prop...
Aggelos Bletsas, Ashish Khisti, David P. Reed, And...