Sciweavers

1506 search results - page 189 / 302
» Application Deployment in Virtual Networks Using the X-Bone
Sort
View
ICCS
2007
Springer
14 years 3 months ago
DDDAS/ITR: A Data Mining and Exploration Middleware for Grid and Distributed Computing
We describe our project that marries data mining together with Grid computing. Specifically, we focus on one data mining application - the Minnesota Intrusion Detection System (MIN...
Jon B. Weissman, Vipin Kumar, Varun Chandola, Eric...
KIVS
2007
Springer
14 years 3 months ago
A Proof of Concept Implementation of SSL/TLS Session-Aware User Authentication (TLS-SA)
Abstract Most SSL/TLS-based e-commerce applications employ conventional mechanisms for user authentication. These mechanisms—if decoupled from SSL/TLS session establishment—are...
Rolf Oppliger, Ralf Hauser, David A. Basin, Aldo R...
CISS
2007
IEEE
13 years 10 months ago
Echo-Cancellation for Ultrasonic Data Transmission through a Metal Channel
– The process control industry has shown great interest in implementation of low cost, low power wireless sensor networks. Such networks are much easier to deploy and reconfigure...
Richard Primerano, Kevin Wanuga, Joseph Dorn, Mosh...
MSS
2000
IEEE
113views Hardware» more  MSS 2000»
14 years 1 months ago
Jiro Storage Management
The Jiro™ technology provides an environment intended for the implementation of storage management solutions. A product based on Jiro technology is an implementation based on th...
Bruce K. Haddon, William H. Connor
SENSYS
2009
ACM
14 years 3 months ago
Experiences with a high-fidelity wireless building energy auditing network
We describe the design, deployment, and experience with a wireless sensor network for high-fidelity monitoring of electrical usage in buildings. A network of 38 mote-class AC met...
Xiaofan Jiang, Minh Van Ly, Jay Taneja, Prabal Dut...