Sciweavers

167 search results - page 22 / 34
» Automated Validation of Service Configuration on Network Dev...
Sort
View
PERCOM
2004
ACM
14 years 7 months ago
Denial-of-Service Attacks on Battery-powered Mobile Computers
Sleep deprivation attacks are a form of denial of service attack whereby an attacker renders a pervasive computing device inoperable by draining the battery more quickly than it w...
Thomas L. Martin, Michael S. Hsiao, Dong S. Ha, Ja...
JNCA
2007
128views more  JNCA 2007»
13 years 7 months ago
Embedded web server-based home appliance networks
Powerful microcontrollers are used as parts of most home and office appliances of today. Integrating web servers to these intelligent devices will aid in controlling them over th...
M. Can Filibeli, Öznur Özkasap, M. Reha ...
GIS
2004
ACM
14 years 8 months ago
Energy efficient exact kNN search in wireless broadcast environments
The advances in wireless communication and decreasing costs of mobile devices have enabled users to access desired information at any time. Coupled with positioning technologies l...
Bugra Gedik, Aameek Singh, Ling Liu
DSN
2002
IEEE
14 years 16 days ago
Pinpoint: Problem Determination in Large, Dynamic Internet Services
Traditional problem determination techniques rely on static dependency models that are difficult to generate accurately in today’s large, distributed, and dynamic application e...
Mike Y. Chen, Emre Kiciman, Eugene Fratkin, Armand...
VLSID
2001
IEEE
144views VLSI» more  VLSID 2001»
14 years 8 months ago
Next Generation Network Processors
Networking hardware manufacturers face the dual demands of supporting ever increasing bandwidth requirements, while also delivering new features, such as the ability to implement ...
Deepak Kataria