Sciweavers

1890 search results - page 246 / 378
» A case for network musical performance
Sort
View
CORR
2010
Springer
141views Education» more  CORR 2010»
13 years 8 months ago
Designing and Embedding Reliable Virtual Infrastructures
In a virtualized infrastructure where physical resources are shared, a single physical server failure will terminate several virtual servers and crippling the virtual infrastructu...
Wai-Leong Yeow, Cédric Westphal, Ulas C. Ko...
DKE
2007
99views more  DKE 2007»
13 years 8 months ago
Interaction pattern detection in process oriented information systems
Finding interaction patterns is a challenging problem, but this kind of information about processes or social networks might be useful for an organization’s management to unders...
Schahram Dustdar, Thomas Hoffmann
MOBILIGHT
2010
13 years 2 months ago
Stealthy Compromise of Wireless Sensor Nodes with Power Analysis Attacks
Node capture is considered as one of the most critical issues in the security of wireless sensor networks. A popular approach to thwart the problem relies on the detection of event...
Giacomo de Meulenaer, François-Xavier Stand...
REALWSN
2010
13 years 2 months ago
Visibility Levels: Managing the Tradeoff between Visibility and Resource Consumption
Pre-deployment tests of sensor networks in indoor testbeds can only deliver a very approximate view of the correctness and performance of a deployed sensor network and it is theref...
Junyan Ma, Kay Römer
INFOCOM
2011
IEEE
12 years 11 months ago
Optimal Sybil-resilient node admission control
—Most existing large-scale networked systems on the Internet such as peer-to-peer systems are vulnerable to Sybil attacks where a single adversary can introduce many bogus identi...
Nguyen Tran, Jinyang Li, Lakshminarayanan Subraman...