<--- Back to Details
First PageDocument Content
Routing algorithms / Routing / Wireless networking / Link-state routing protocol / Ant colony optimization algorithms / ANts P2P / Network topology / Swarm intelligence / Dynamic Source Routing / Network architecture / Computing / Routing protocols
Date: 2008-06-12 00:49:29
Routing algorithms
Routing
Wireless networking
Link-state routing protocol
Ant colony optimization algorithms
ANts P2P
Network topology
Swarm intelligence
Dynamic Source Routing
Network architecture
Computing
Routing protocols

Adaptive-SDR: Adaptive Swarm-based Distributed Routing I. Kassabalidis*, M.A. El-Sharkawi*, R.J.Marks II*, P. Arabshahi†, A.A. Gray† _ * Dept. of Electrical Eng., Box[removed]University of Washington

Add to Reading List

Source URL: staff.washington.edu

Download Document from Source Website

File Size: 179,23 KB

Share Document on Facebook

Similar Documents

Appears in Proc. of ACM/IFIP/USENIX Intl. Middleware Conf. (MiddlewareApproximate Object Location and Spam Filtering on Peer-to-peer Systems Feng Zhou, Li Zhuang, Ben Y. Zhao, Ling Huang, Anthony D. Joseph, and J

Appears in Proc. of ACM/IFIP/USENIX Intl. Middleware Conf. (MiddlewareApproximate Object Location and Spam Filtering on Peer-to-peer Systems Feng Zhou, Li Zhuang, Ben Y. Zhao, Ling Huang, Anthony D. Joseph, and J

DocID: 1gA1J - View Document

Poster: Blindspot: Indistinguishable Anonymous Communications Joseph Gardiner, Shishir Nagaraja Security Lancaster Research Centre Lancaster University United Kingdom, LA1 4WA

Poster: Blindspot: Indistinguishable Anonymous Communications Joseph Gardiner, Shishir Nagaraja Security Lancaster Research Centre Lancaster University United Kingdom, LA1 4WA

DocID: 1fSby - View Document

2014 IEEE Security and Privacy Workshops  iCOP: Automatically Identifying New Child Abuse Media in P2P Networks Claudia Peersman∗ , Christian Schulze† , Awais Rashid∗ , Margaret Brennan‡ and Carl Fischer∗ ∗ S

2014 IEEE Security and Privacy Workshops iCOP: Automatically Identifying New Child Abuse Media in P2P Networks Claudia Peersman∗ , Christian Schulze† , Awais Rashid∗ , Margaret Brennan‡ and Carl Fischer∗ ∗ S

DocID: 1au9r - View Document

Distributed Middleware Architectures for Scalable Media Services V. Kalogeraki, D. Zeinalipour-Yazti ∗, D. Gunopulos Department of Computer Science and Engineering University of California - Riverside Riverside, CA 925

Distributed Middleware Architectures for Scalable Media Services V. Kalogeraki, D. Zeinalipour-Yazti ∗, D. Gunopulos Department of Computer Science and Engineering University of California - Riverside Riverside, CA 925

DocID: 1aoyq - View Document

2014 IEEE Security and Privacy Workshops  PeerShark: Detecting Peer-to-Peer Botnets by Tracking Conversations Pratik Narang, Subhajit Ray, Chittaranjan Hota

2014 IEEE Security and Privacy Workshops PeerShark: Detecting Peer-to-Peer Botnets by Tracking Conversations Pratik Narang, Subhajit Ray, Chittaranjan Hota

DocID: 1anYk - View Document