Sciweavers

1506 search results - page 177 / 302
» Application Deployment in Virtual Networks Using the X-Bone
Sort
View
CCS
2008
ACM
13 years 11 months ago
Privacy oracle: a system for finding application leaks with black box differential testing
We describe the design and implementation of Privacy Oracle, a system that reports on application leaks of user information via the network traffic that they send. Privacy Oracle ...
Jaeyeon Jung, Anmol Sheth, Ben Greenstein, David W...
CANPC
1999
Springer
14 years 1 months ago
Implementing Application-Specific Cache-Coherence Protocols in Configurable Hardware
Streamlining communication is key to achieving good performance in shared-memory parallel programs. While full hardware support for cache coherence generally offers the best perfo...
David Brooks, Margaret Martonosi
CVPR
2009
IEEE
1385views Computer Vision» more  CVPR 2009»
15 years 4 months ago
Distributed Multi-Target Tracking In A Self-Configuring Camera Network
This paper deals with the problem of tracking multiple targets in a distributed network of self-configuring pan-tilt-zoom cameras. We focus on applications where events unfold over...
Amit K. Roy Chowdhury, Bi Song, Cristian Soto
ICDCS
2011
IEEE
12 years 8 months ago
Localizing Multiple Jamming Attackers in Wireless Networks
Abstract—Jamming attacks and unintentional radio interference are one of the most urgent threats harming the dependability of wireless communication and endangering the successfu...
Hongbo Liu, Zhenhua Liu, Yingying Chen, Wenyuan Xu
PERCOM
2007
ACM
14 years 8 months ago
Analytical modeling and mitigation techniques for the energy hole problem in sensor networks
In this paper we investigate the problem of uneven energy consumptions in a large class of many-to-one sensor networks. In a many-to-one sensor network, all sensor nodes generate ...
Jian Li, Prasant Mohapatra