Sciweavers

807 search results - page 13 / 162
» Deploying and evaluating a location-aware system
Sort
View
DEXA
2009
Springer
138views Database» more  DEXA 2009»
14 years 3 months ago
Evaluating Non-In-Place Update Techniques for Flash-Based Transaction Processing Systems
Recently, flash memory is emerging as the storage device. With price sliding fast, the cost per capacity is approaching to that of SATA disk drives. So far flash memory has been ...
Yongkun Wang, Kazuo Goda, Masaru Kitsuregawa
TMC
2010
136views more  TMC 2010»
13 years 7 months ago
Relay Node Deployment Strategies in Heterogeneous Wireless Sensor Networks
– While a lot of existing research attempts to extend the lifetime of a wireless sensor network (WSN) by designing energy efficient networking protocols, the impact of random dev...
Kenan Xu, Hossam S. Hassanein, Glen Takahara, Quan...
SP
2009
IEEE
106views Security Privacy» more  SP 2009»
14 years 3 months ago
Pretty-Bad-Proxy: An Overlooked Adversary in Browsers' HTTPS Deployments
– HTTPS is designed to provide secure web communications over insecure networks. The protocol itself has been rigorously designed and evaluated by assuming the network as an adve...
Shuo Chen, Ziqing Mao, Yi-Min Wang, Ming Zhang
ITNG
2010
IEEE
14 years 27 days ago
QARI: Quality Aware Software Deployment for Wireless Sensor Networks
Abstract--If we are to deploy sensor applications in a realistic business context, we must provide innovative middleware services to control and enforce required system behavior; i...
Wouter Horré, Sam Michiels, Wouter Joosen, ...
NDSS
2000
IEEE
14 years 28 days ago
Secure Border Gateway Protocol (S-BGP) - Real World Performance and Deployment Issues
The Border Gateway Protocol (BGP), which is used to distribute routing information between autonomous systems, is an important component of the Internet’s routing infrastructure...
Stephen T. Kent, Charles Lynn, Joanne Mikkelson, K...