Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 234,327,589 papers from all fields of science
Search
Sign In
Create Free Account
Centralized computing
Centralized computing is computing done at a central location, using terminals that are attached to a central computer. The computer itself may…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
30 relations
Cathode ray tube
Client–server model
Communications protocol
Computer file
Expand
Broader (1)
Cloud computing
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
Highly Cited
2011
Highly Cited
2011
Fast-Lipschitz optimization with wireless sensor networks applications
C. Fischione
Proceedings of the 10th ACM/IEEE International…
2011
Corpus ID: 1189617
Motivated by the need for fast computations demanded by wireless sensor networks, the new F-Lipschitz optimization theory is…
Expand
Highly Cited
2009
Highly Cited
2009
Traffic-Known Urban Vehicular Route Prediction Based on Partial Mobility Patterns
Guangtao Xue
,
Zhongwei Li
,
Hongzi Zhu
,
Yunhuai Liu
International Conference on Parallel and…
2009
Corpus ID: 15827618
Travel route analysis and prediction are essential for the success of many applications in Vehicular Ad-hoc Networks (VANETs…
Expand
2009
2009
Association between nodes to combat blackhole attack in DSR based MANET
N. Bhalaji
,
A. Shanmugam
IFIP International Conference on Wireless and…
2009
Corpus ID: 11469989
Mobile adhoc network (MANET) has become an exciting and important technology in recent years because of the rapid proliferation…
Expand
Highly Cited
2007
Highly Cited
2007
Scenario based Performance Analysis of AODV and OLSR in Mobile Ad hoc Networks
S. Gowrishankar
,
T. Basavaraju
,
M. Singh
,
S. Sarkar
2007
Corpus ID: 102327631
A mobile ad hoc network (MANET) is a network consisting of a set of wireless mobile nodes that communicate with each other…
Expand
Highly Cited
2005
Highly Cited
2005
A Framework for Location Privacy in Wireless Networks
Chunqing Hu
,
Helen J. Wang
2005
Corpus ID: 16544486
Abstract Though an increasing number of wireless hotspots and mesh networksare being deployed, the problem of location privacy…
Expand
2005
2005
Distributed Hash Tables
Klaus Wehrle
,
S. Götz
,
S. Rieche
Peer-to-Peer Systems and Applications
2005
Corpus ID: 5261179
In the last few years, an increasing number of massively distributed systems with millions of participants has emerged within…
Expand
Highly Cited
2003
Highly Cited
2003
Dynamic Address Configuration in Mobile Ad hoc Networks
Yuan Sun
,
E. Belding-Royer
2003
Corpus ID: 14697896
The majority of routing protocols for ad hoc networks assume that mobile nodes are configured a priori with unique IP addresses…
Expand
Highly Cited
2002
Highly Cited
2002
Distributed Search in P2P Networks
S. Waterhouse
,
David Doolin
,
Gene Kan
,
Yaroslav Faybishenko
IEEE Internet Computing
2002
Corpus ID: 40253633
Most Web content is invisible to current search engines. JXTA Search addresses this problem, providing a unique query routing…
Expand
Highly Cited
1997
Highly Cited
1997
Multiuser demodulation for DS-CDMA systems in fading channels
M. Juntti
1997
Corpus ID: 4201054
Multiuser demodulation algorithms for centralized receivers of asynchronous direct-sequence (DS) spread-spectrum code-division…
Expand
Highly Cited
1994
Highly Cited
1994
On sign-board based inter-robot communication in distributed robotic systems
Jing Wang
Proceedings of the IEEE International Conference…
1994
Corpus ID: 10739586
Inter-robot communication based on the conceptual mechanism of "sign-board" in distributed robotic systems (DRS) is discussed…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE