Sciweavers

2275 search results - page 394 / 455
» A Deployment System for Pervasive Computing
Sort
View
IMC
2003
ACM
15 years 9 months ago
Simple network performance tomography
In network performance tomography, characteristics of the network interior are inferred by correlating end-to-end measurements. In much previous work, the presence of correlations...
Nick G. Duffield
SENSYS
2003
ACM
15 years 9 months ago
Differentiated surveillance for sensor networks
For many sensor network applications such as military surveillance, it is necessary to provide full sensing coverage to a security-sensitive area while at the same time minimizing...
Ting Yan, Tian He, John A. Stankovic
RIDE
1999
IEEE
15 years 8 months ago
WISE: Business to Business E-Commerce
The Internet and the proliferation of inexpensive computing power in the form of clusters of workstations or PCs provide the basic hardware infrastructure for business to business...
Gustavo Alonso, Ulrich Fiedler, Claus Hagen, Amaia...
ESAS
2006
Springer
15 years 7 months ago
Re-visited: Denial of Service Resilient Access Control for Wireless Sensor Networks
The appliance of wireless sensor networks to a broad variety of applications doubtlessly requires end-user acceptance. End-users from various computer network unrelated disciplines...
Frederik Armknecht, Joao Girão, Marc Stoeck...
ACL
1998
15 years 5 months ago
Growing Semantic Grammars
A critical path in the development of natural language understanding NLU modules lies in the di culty of de ning a mapping from words to semantics: Usually it takes in the order o...
Marsal Gavaldà, Alex Waibel