Sciweavers

1352 search results - page 233 / 271
» Designing Security Requirements Models Through Planning
Sort
View
QEST
2010
IEEE
13 years 6 months ago
On the Theory of Stochastic Processors
Traditional architecture design approaches hide hardware uncertainties from the software stack through overdesign, which is often expensive in terms of power consumption. The recen...
Parasara Sridhar Duggirala, Sayan Mitra, Rakesh Ku...
ICCNMC
2005
Springer
14 years 2 months ago
Sensor Network Configuration Under Physical Attacks
— In this paper, we address a sensor network lifetime problem that maintains a certain throughput in an environment where physical node destruction is possible. While lifetime is...
Xun Wang, Wenjun Gu, Kurt Schosek, Sriram Chellapp...
USENIX
2007
13 years 11 months ago
Load Shedding in Network Monitoring Applications
Monitoring and mining real-time network data streams is crucial for managing and operating data networks. The information that network operators desire to extract from the network...
Pere Barlet-Ros, Gianluca Iannaccone, Josep Sanju&...
CORR
2007
Springer
130views Education» more  CORR 2007»
13 years 8 months ago
An Autonomous Distributed Admission Control Scheme for IEEE 802.11 DCF
Admission control as a mechanism for providing QoS requires an accurate description of the requested flow as well as already admitted flows. Since 802.11 WLAN capacity is shared...
Preetam Patil, Varsha Apte
MOBISYS
2008
ACM
14 years 8 months ago
Flashproxy: transparently enabling rich web content via remote execution
It is now common for Web sites to use active Web content, such as Flash, Silverlight, or Java applets, to support rich, interactive applications. For many mobile devices, however,...
Alexander Moshchuk, Steven D. Gribble, Henry M. Le...