Sciweavers

807 search results - page 53 / 162
» Deploying and evaluating a location-aware system
Sort
View
DSN
2006
IEEE
14 years 4 months ago
Randomized Intrusion-Tolerant Asynchronous Services
Randomized agreement protocols have been around for more than two decades. Often assumed to be inefficient due to their high expected communication and time complexities, they ha...
Henrique Moniz, Nuno Ferreira Neves, Miguel Correi...
ISCC
2005
IEEE
120views Communications» more  ISCC 2005»
14 years 3 months ago
Modular Reference Implementation of an IP-DSLAM
We describe a modular reference implementation of an IPbased DSL access multiplexer (DSLAM). We identify deployment trends and primary tasks a future DSLAM has to offer. The imple...
Christian Sauer, Matthias Gries, Sören Sonnta...
EUROMICRO
2009
IEEE
14 years 4 months ago
A Component-Based Technology for Hardware and Software Components
One of the challenges in development of embedded systems is to cope with hardware and software components simultaneously. Often is their integration cumbersome due to their incomp...
Luka Lednicki, Ana Petricic, Mario Zagar
IWSOS
2009
Springer
14 years 4 months ago
A Self-organizing Approach to Activity Recognition with Wireless Sensors
Abstract. In this paper, we describe an approach to activity recognition, which is based on a self-organizing, ad hoc network of body-worn sensors. It makes best use of the availab...
Clemens Holzmann, Michael Haslgrübler
CNSR
2008
IEEE
126views Communications» more  CNSR 2008»
14 years 4 months ago
Distributed Exchange of Alerts for the Detection of Coordinated Attacks
Attacks and intrusions to information systems cause large revenue losses. The prevention of these attacks is not always possible by just considering information from isolated sour...
Joaquín García-Alfaro, Michael A. Ja...