Sciweavers

335 search results - page 60 / 67
» Control patterns in a healthcare network
Sort
View
MUE
2008
IEEE
83views Multimedia» more  MUE 2008»
14 years 2 months ago
Using Adaptive Bandwidth Allocation Approach to Defend DDoS Attacks
Denial of service attacks occur when the attacks are from a single host, whereas distributed denial of service attacks occur when multiple affected systems flood the bandwidth or ...
Chu-Hsing Lin, Jung-Chun Liu, Hsun-Chi Huang, Tsun...
SASO
2007
IEEE
14 years 2 months ago
Towards Supporting Interactions between Self-Managed Cells
Management in pervasive systems cannot rely on human intervention or centralised decision-making functions. It must be devolved, based on local decision-making and feedback contro...
Alberto E. Schaeffer Filho, Emil C. Lupu, Naranker...
ISORC
2006
IEEE
14 years 1 months ago
RTSTREAM: Real-Time Query Processing for Data Streams
Many real-time applications, such as traffic control systems, surveillance systems and health monitoring systems, need to operate on continuous unbounded streams of data. These ap...
Yuan Wei, Sang Hyuk Son, John A. Stankovic
VALUETOOLS
2006
ACM
141views Hardware» more  VALUETOOLS 2006»
14 years 1 months ago
A realistic simulation of internet-scale events
Internet-scale security incidents are becoming increasingly common, and the researchers need tools to replicate and study them in a controlled setting. Current network simulators,...
Songjie Wei, Jelena Mirkovic
DFT
2005
IEEE
178views VLSI» more  DFT 2005»
14 years 1 months ago
Inter-Plane Via Defect Detection Using the Sensor Plane in 3-D Heterogeneous Sensor Systems
Defect and fault tolerance is being studied in a 3D Heterogeneous Sensor using a stacked chip with sensors located on the top plane, and inter-plane vias connecting these to other...
Glenn H. Chapman, Vijay K. Jain, Shekhar Bhansali