Sciweavers

972 search results - page 41 / 195
» Design and Protocol for Internet Accessible Mathematical Com...
Sort
View
IMC
2007
ACM
13 years 10 months ago
Passive online rogue access point detection using sequential hypothesis testing with TCP ACK-pairs
Rogue (unauthorized) wireless access points pose serious security threats to local networks. In this paper, we propose two online algorithms to detect rogue access points using se...
Wei Wei, Kyoungwon Suh, Bing Wang, Yu Gu, Jim Kuro...
WWW
2003
ACM
14 years 1 months ago
WS-Membership - Failure Management in a Web-Services World
An important factor in the successful deployment of federated web-services-based business activities will be the ability to guarantee reliable distributed operation and execution....
Werner Vogels, Christopher Ré
JDCTA
2010
95views more  JDCTA 2010»
13 years 3 months ago
WebAccess Based Remote Graphic Surveillance System for Mechatronics
This study employed WebAccess software to construct a remote graphic surveillance system, which was developed differently from previous remote monitoring systems. Advantech WebAcc...
Wen-Jye Shyr, Chia-Ming Lin, Wei-Ting Chiang
TRIDENTCOM
2005
IEEE
14 years 2 months ago
An Open Access Wideband Multi-Antenna Wireless Testbed with Remote Control Capability
This paper introduces an open access wideband multiantenna wireless testbed. The testbed is configured as a four transmit antenna by four receive antenna system based on software...
Weijun Zhu, David W. Browne, Michael P. Fitz
HPCC
2009
Springer
14 years 1 months ago
C2Cfs: A Collective Caching Architecture for Distributed File Access
—In this paper we present C2Cfs - a decentralized collective caching architecture for distributed filesystems. C2Cfs diverges from the traditional client-server model and advoca...
Andrey Ermolinskiy, Renu Tewari