Sciweavers

1266 search results - page 31 / 254
» Threat Evaluation Method for Distributed Network Environment
Sort
View
NETGAMES
2004
ACM
15 years 5 months ago
Scalable peer-to-peer networked virtual environment
We propose a fully-distributed peer-to-peer architecture to solve the scalability problem of Networked Virtual Environment in a simple and efficient manner. Our method exploits lo...
Shun-Yun Hu, Guan-Ming Liao
CW
2004
IEEE
15 years 3 months ago
Peer-to-Peer Networked Field-type Virtual Environment by Using AtoZ
This paper aims to study how to gain the consistency of the state in a DVE (Distributed Virtual Environment) with lag, under the condition of peer-to-peer architecture. That is, w...
Tatsuhiro Yonekura, Yoshihiro Kawano, Dai Hanawa
MOBIHOC
2005
ACM
15 years 11 months ago
Toward resilient security in wireless sensor networks
Node compromise poses severe security threats in wireless sensor networks. Unfortunately, existing security designs can address only a small, fixed threshold number of compromised...
Hao Yang, Fan Ye, Yuan Yuan, Songwu Lu, William A....
WWW
2004
ACM
16 years 15 days ago
A method for transparent admission control and request scheduling in e-commerce web sites
This paper presents a method for admission control and request scheduling for multiply-tiered e-commerce Web sites, achieving both stable behavior during overload and improved res...
Sameh Elnikety, Erich M. Nahum, John M. Tracey, Wi...
TRIDENTCOM
2010
IEEE
14 years 9 months ago
Managing Distributed Applications Using Gush
Deploying and controlling experiments running on a distributed set of resources is a challenging task. Software developers often spend a significant amount of time dealing with the...
Jeannie Albrecht, Danny Yuxing Huang