Sciweavers

3871 search results - page 752 / 775
» A System Architecture for Distributed Control Loop Applicati...
Sort
View
119
Voted
SENSYS
2009
ACM
15 years 9 months ago
The case for a network protocol isolation layer
Network protocols are typically designed and tested individually. In practice, however, applications use multiple protocols concurrently. This discrepancy can lead to failures fro...
Jung Il Choi, Maria A. Kazandjieva, Mayank Jain, P...
119
Voted
AAIM
2006
Springer
129views Algorithms» more  AAIM 2006»
15 years 6 months ago
Secure Overlay Network Design
Due to the increasing security threats on the Internet, new overlay network architectures have been proposed to secure privileged services. In these architectures, the application...
Erran L. Li, Mohammad Mahdian, Vahab S. Mirrokni
146
Voted
ICWS
2003
IEEE
15 years 3 months ago
A Web Service Approach to Universal Accessibility in Collaboration Services
The enormous growth in wireless communications and miniaturized handheld devices in the last few years, have given rise to a vast range of new services, for heterogeneous user env...
Sangmi Lee, Sung Hoon Ko, Geoffrey Fox, Kang-Seok ...
145
Voted
PAMI
2012
13 years 5 months ago
Altered Fingerprints: Analysis and Detection
—The widespread deployment of Automated Fingerprint Identification Systems (AFIS) in law enforcement and border control applications has heightened the need for ensuring that the...
Soweon Yoon, Jianjiang Feng, Anil K. Jain
158
Voted
MOBISYS
2008
ACM
15 years 4 months ago
Community sensor grids: virtualization for sharing across domains
Wireless sensor networks have been traditionally designed to be privately owned and used. Hence the two hallmark features of sensor networks, namely customized network application...
Amiya Bhattacharya, Meddage S. Fernando, Partha Da...