Sciweavers

3810 search results - page 676 / 762
» Using mobile agents for network performance management
Sort
View
100
Voted
CCR
2004
147views more  CCR 2004»
14 years 10 months ago
Safe compositional specification of networking systems
The science of network service composition has emerged as one of the grand themes of networking research [17] as a direct result of the complexity and sophistication of emerging n...
Azer Bestavros, Adam Bradley, Assaf J. Kfoury, Ibr...
97
Voted
CN
1998
64views more  CN 1998»
14 years 10 months ago
Decentralized Network Connection Preemption Algorithms
Connection preemption provides available and reliable services to high-priority connections when a network is heavily loaded and connection request arrival patterns are unknown, o...
Mohammad Peyravian, Ajay D. Kshemkalyani
COMCOM
2006
81views more  COMCOM 2006»
14 years 10 months ago
Multiple link failures survivability of optical networks with traffic grooming capability
This paper investigates the problem of survivable traffic grooming (STG) in shared mesh optical networks and proposes different frameworks for improving the survivability of low s...
Chadi Assi, Wei Huo, Abdallah Shami
156
Voted
SIGMOD
2009
ACM
180views Database» more  SIGMOD 2009»
15 years 10 months ago
Indexing correlated probabilistic databases
With large amounts of correlated probabilistic data being generated in a wide range of application domains including sensor networks, information extraction, event detection etc.,...
Bhargav Kanagal, Amol Deshpande
CCS
2010
ACM
14 years 11 months ago
Securing wireless sensor networks against large-scale node capture attacks
Securing wireless sensor networks against node capture is a challenging task. All well-known random key pre-distribution systems, including the Eschenauer and Gligor's pionee...
Tuan Manh Vu, Reihaneh Safavi-Naini, Carey William...