Sciweavers

1866 search results - page 314 / 374
» A graph-theoretic approach to distributed control over netwo...
Sort
View
ICPADS
2006
IEEE
14 years 2 months ago
Experiences with Simulations - A Light and Fast Model for Secure Web Applications
Using simulations of a complex system such as a Web Application Server provides us with a tool that allows the running of tests without using the resources needed in a real system...
Ramon Nou, Jordi Guitart, David Carrera, Jordi Tor...
MATES
2005
Springer
14 years 2 months ago
Semantic Methods for P2P Query Routing
Knowledge sharing in a virtual organization requires a knowledge life cycle including knowledge provisioning, terminology alignment, determination of resource location, query routi...
Alexander Löser, Steffen Staab, Christoph Tem...
ENVSOFT
2010
100views more  ENVSOFT 2010»
13 years 9 months ago
Coupled urban wind flow and indoor natural ventilation modelling on a high-resolution grid: A case study for the Amsterdam ArenA
Wind flow in urban environments is an important factor governing the dispersion of heat and pollutants from streets, squares and buildings. This paper presents a coupled CFD model...
T. van Hooff, B. Blocken
BROADNETS
2007
IEEE
14 years 3 months ago
Cross-layer optimization made practical
Abstract— Limited resources and time-varying nature of wireless ad hoc networks demand optimized use of resources across layers. Cross-layer optimization (CLO) for wireless netwo...
Ajit Warrier, Long Le, Injong Rhee
TMC
2010
179views more  TMC 2010»
13 years 7 months ago
On Fast and Accurate Detection of Unauthorized Wireless Access Points Using Clock Skews
We explore the use of clock skew of a wireless local area network access point (AP) as its fingerprint to detect unauthorized APs quickly and accurately. The main goal behind usi...
Suman Jana, Sneha Kumar Kasera