Sciweavers

372 search results - page 54 / 75
» Trade-Off Results for Connection Management
Sort
View
ICUMT
2009
14 years 9 months ago
Hierarchical p2p overlays for DVE: An Additively Weighted Voronoi based approach
This paper presents a support for the development of Distributed Virtual Environments (DVEs) on P2P architectures. A hierarchical overlay is defined by pairing each peer with a wei...
Michele Albano, Laura Ricci, Luca Genovali
ICUMT
2009
14 years 9 months ago
Free-CLASH - improved localization-free clustering in large wireless sensor networks
This paper investigates topology management of large wireless sensor networks. Due to their random deployment, nodes have to organize themselves as energy efficient as possible to ...
Jakob Salzmann, Ralf Behnke, Jiaxi You, Dirk Timme...

Publication
117views
14 years 8 months ago
Design, Implementation, and Performance Analysis of DiscoSec–Service Pack for Securing WLANs
To improve the already tarnished reputation of WLAN security, the new IEEE 802.11i security standard provides means for an enhanced user authentication and strong data confidential...
Ivan Martinovic, Paul Pichota, Matthias Wilhelm, F...
SJ
2011
14 years 6 months ago
Analyzing the Resilience of Complex Supply Network Topologies Against Random and Targeted Disruptions
—In this paper, we study the resilience of supply networks against disruptions and provide insights to supply chain managers on how to construct a resilient supply network from t...
Kang Zhao, Akhil Kumar, Terry P. Harrison, John Ye...
HICSS
2007
IEEE
148views Biometrics» more  HICSS 2007»
15 years 6 months ago
Binding Now or Binding Later: The Performance of UDDI Registries
In service-oriented environments, the fluidity of the marketplace introduces changes in service offerings and subsequent connection failures for users still bound to outdated serv...
M. Brian Blake, Amy Lynn Sliva, Michael zur Muehle...