Sciweavers

1266 search results - page 45 / 254
» Threat Evaluation Method for Distributed Network Environment
Sort
View
LISA
2007
15 years 2 months ago
Remote Control: Distributed Application Configuration, Management, and Visualization with Plush
Support for distributed application management in large-scale networked environments remains in its early stages. Although a number of solutions exist for subtasks of application ...
Jeannie R. Albrecht, Ryan Braud, Darren Dao, Nikol...
IPPS
2007
IEEE
15 years 6 months ago
Message Routing and Scheduling in Optical Multistage Networks using Bayesian Inference method on AI algorithms
Optical Multistage Interconnection Networks (MINs) suffer from optical-loss during switching and crosstalk problem in the switches. The crosstalk problem is solved by routing mess...
Ajay K. Katangur, Somasheker Akkaladevi
MOBIHOC
2009
ACM
16 years 12 days ago
Fine-grained boundary recognition in wireless ad hoc and sensor networks by topological methods
Location-free boundary recognition is crucial and critical for many fundamental network functionalities in wireless ad hoc and sensor networks. Previous designs, often coarse-grai...
Dezun Dong, Yunhao Liu, Xiangke Liao
CIA
2008
Springer
15 years 1 months ago
Filter Allocation Using Iterative ECNP
Network devices can filter traffic in order to protect end-user computers against network worms and other threats. Since these devices have very limited memories and cannot deploy ...
Jan Tozicka, Stepán Urban, Magdalena Prokop...
ICDCSW
2005
IEEE
15 years 5 months ago
Publisher Mobility in Distributed Publish/Subscribe Systems
The decoupling of producers and consumers in the publish/subscribe paradigm lends itself well to the support of mobile users who roam about the environment with intermittent netwo...
Vinod Muthusamy, Milenko Petrovic, Dapeng Gao, Han...