Sciweavers

807 search results - page 69 / 162
» Deploying and evaluating a location-aware system
Sort
View
DSN
2005
IEEE
14 years 3 months ago
ADEPTS: Adaptive Intrusion Response Using Attack Graphs in an E-Commerce Environment
Distributed systems with multiple interacting services, such as distributed e-commerce systems, are suitable targets for malicious attacks because of the potential financial impac...
Bingrui Foo, Yu-Sung Wu, Yu-Chun Mao, Saurabh Bagc...
INFOCOM
2010
IEEE
13 years 8 months ago
TopBT: A Topology-Aware and Infrastructure-Independent BitTorrent Client
—BitTorrent (BT) has carried out a significant and continuously increasing portion of Internet traffic. While several designs have been recently proposed and implemented to imp...
Shansi Ren, Enhua Tan, Tian Luo, Songqing Chen, Le...
CN
2010
130views more  CN 2010»
13 years 7 months ago
CoreCast: How core/edge separation can help improving inter-domain live streaming
The rapid growth of broadband access has popularized multimedia services, which nowadays contribute to a large part of Internet traffic. Among this content, the broadcasting of li...
Loránd Jakab, Albert Cabellos-Aparicio, Tho...
MONET
2008
150views more  MONET 2008»
13 years 10 months ago
A Multi-radio 802.11 Mesh Network Architecture
Routers equipped with multiple 802.11 radios can alleviate capacity problems in wireless mesh networks. However, a practical, complete system architecture that can realize the bene...
Krishna N. Ramachandran, Irfan Sheriff, Elizabeth ...
PERVASIVE
2004
Springer
14 years 3 months ago
Activity Recognition in the Home Using Simple and Ubiquitous Sensors
In this work, a system for recognizing activities in the home setting using a set of small and simple state-change sensors is introduced. The sensors are designed to be “tape on ...
Emmanuel Munguia Tapia, Stephen S. Intille, Kent L...