Sciweavers

5740 search results - page 1098 / 1148
» Application of Level Set Methods in Computer Vision
Sort
View
VEE
2009
ACM
240views Virtualization» more  VEE 2009»
14 years 2 months ago
Memory buddies: exploiting page sharing for smart colocation in virtualized data centers
Many data center virtualization solutions, such as VMware ESX, employ content-based page sharing to consolidate the resources of multiple servers. Page sharing identifies virtual...
Timothy Wood, Gabriel Tarasuk-Levin, Prashant J. S...
IWCMC
2009
ACM
14 years 2 months ago
Dynamic trust establishment in emergency ad hoc networks
This paper proposes a dynamic trust establishment protocol that enables the nodes of an ad hoc network to establish security associations among each other in a distributed and pee...
Christos A. Papageorgiou, Konstantinos Birkos, Tas...
RTSS
2007
IEEE
14 years 1 months ago
ANDES: An ANalysis-Based DEsign Tool for Wireless Sensor Networks
— We have developed an analysis-based design tool, ANDES, for modeling a wireless sensor network system and analyzing its performance before deployment. ANDES enables designers t...
Vibha Prasad, Ting Yan, Praveen Jayachandran, Zeng...
ICDS
2007
IEEE
14 years 1 months ago
On Smart-Care Services: Studies of Visually Impaired Users in Living Contexts
- Smart care technology is any sensor based technology used to aid and support human independent living. Such technologies offer new potential and can give rise to new problems for...
Ying Liu, Jean Bacon, Roger Wilson-Hinds
TRIDENTCOM
2006
IEEE
14 years 1 months ago
Emulation versus simulation: A case study of TCP-targeted denial of service attacks
—In this paper, we investigate the applicability of simulation and emulation for denial of service (DoS) attack experimentation. As a case study, we consider low-rate TCP-targete...
Roman Chertov, Sonia Fahmy, Ness B. Shroff
« Prev « First page 1098 / 1148 Last » Next »