Sciweavers

575 search results - page 95 / 115
» Conditions for tracking in networked control systems
Sort
View
CCS
2009
ACM
14 years 8 months ago
Semantic context aware security policy deployment
The successful deployment of a security policy is closely related not only to the complexity of the security requirements but also to the capabilities/functionalities of the secur...
Frédéric Cuppens, Joaquín Gar...
INFOCOM
2006
IEEE
14 years 2 months ago
Mobile Emulab: A Robotic Wireless and Sensor Network Testbed
Abstract— Simulation has been the dominant research methodology in wireless and sensor networking. When mobility is added, real-world experimentation is especially rare. However,...
David Johnson, Tim Stack, Russ Fish, Daniel Montra...
DAIS
2001
13 years 9 months ago
Sentient Computing for Everyone
: Sentient Computing gives perception to computing systems so that they can detect, interpret and respond to changing aspects of users' context. The location attribute of a us...
Diego López de Ipiña, Sai Lai Lo
ICNP
2007
IEEE
14 years 2 months ago
Loss and Delay Accountability for the Internet
— The Internet provides no information on the fate of transmitted packets, and end systems cannot determine who is responsible for dropping or delaying their traffic. As a resul...
Katerina J. Argyraki, Petros Maniatis, O. Irzak, S...
ICC
2000
IEEE
14 years 11 days ago
A Framework for the Analysis of Adaptive Voice over IP
— In this paper, we present a framework for the analysis of a set of adaptive variable-bit-rate voice sources in a packet network. The instantaneous bit rate of each source is de...
Claudio Casetti, J. C. De Martin, Michela Meo