Sciweavers

1626 search results - page 324 / 326
» Computing the Types of the Relationships between Autonomous ...
Sort
View
TRIDENTCOM
2006
IEEE
14 years 2 months ago
Emulation versus simulation: A case study of TCP-targeted denial of service attacks
—In this paper, we investigate the applicability of simulation and emulation for denial of service (DoS) attack experimentation. As a case study, we consider low-rate TCP-targete...
Roman Chertov, Sonia Fahmy, Ness B. Shroff
CASES
2006
ACM
14 years 2 months ago
Limitations of special-purpose instructions for similarity measurements in media SIMD extensions
Microprocessor vendors have provided special-purpose instructions such as psadbw and pdist to accelerate the sumof-absolute differences (SAD) similarity measurement. The usefulne...
Asadollah Shahbahrami, Ben H. H. Juurlink, Stamati...
ATAL
2005
Springer
14 years 2 months ago
Voting policies that cope with unreliable agents
Collaboration plays a critical role when a team is striving for goals that are difficult to achieve by an individual. In previous work, we defined the ETAPP (Environment-TaskAgen...
Christian Guttmann, Ingrid Zukerman
SEM
2004
Springer
14 years 1 months ago
Service Discovery Protocol Interoperability in the Mobile Environment
The emergence of portable computers and wireless technologies has introduced new challenges for middleware. Mobility brings new requirements and is becoming a key characteristic. M...
Yérom-David Bromberg, Valérie Issarn...
SENSYS
2003
ACM
14 years 1 months ago
Bandwidth management in wireless sensor networks
Wireless sensor networks are often used in monitoring and control applications, where software running on generalpurpose computers “pull” information from remote sensors and ...
Bret Hull, Kyle Jamieson, Hari Balakrishnan