Sciweavers

3810 search results - page 676 / 762
» Using mobile agents for network performance management
Sort
View
CCR
2004
147views more  CCR 2004»
15 years 14 days ago
Safe compositional specification of networking systems
The science of network service composition has emerged as one of the grand themes of networking research [17] as a direct result of the complexity and sophistication of emerging n...
Azer Bestavros, Adam Bradley, Assaf J. Kfoury, Ibr...
CN
1998
64views more  CN 1998»
15 years 9 days ago
Decentralized Network Connection Preemption Algorithms
Connection preemption provides available and reliable services to high-priority connections when a network is heavily loaded and connection request arrival patterns are unknown, o...
Mohammad Peyravian, Ajay D. Kshemkalyani
102
Voted
COMCOM
2006
81views more  COMCOM 2006»
15 years 19 days ago
Multiple link failures survivability of optical networks with traffic grooming capability
This paper investigates the problem of survivable traffic grooming (STG) in shared mesh optical networks and proposes different frameworks for improving the survivability of low s...
Chadi Assi, Wei Huo, Abdallah Shami
182
Voted
SIGMOD
2009
ACM
180views Database» more  SIGMOD 2009»
16 years 25 days ago
Indexing correlated probabilistic databases
With large amounts of correlated probabilistic data being generated in a wide range of application domains including sensor networks, information extraction, event detection etc.,...
Bhargav Kanagal, Amol Deshpande
107
Voted
CCS
2010
ACM
15 years 1 months ago
Securing wireless sensor networks against large-scale node capture attacks
Securing wireless sensor networks against node capture is a challenging task. All well-known random key pre-distribution systems, including the Eschenauer and Gligor's pionee...
Tuan Manh Vu, Reihaneh Safavi-Naini, Carey William...