Sciweavers

85 search results - page 13 / 17
» Designing for Disasters
Sort
View
SISW
2003
IEEE
14 years 1 months ago
Fast and Secure Magnetic WORM Storage Systems
Computer forensic analysis, intrusion detection and disaster recovery are all dependent on the existence of trustworthy log files. Current storage systems for such log files are...
Yongge Wang, Yuliang Zheng
AINTEC
2006
Springer
14 years 10 days ago
Application Performance Assessment on Wireless Ad Hoc Networks
Using ad hoc networks as alternative means of communication in disaster situations is a salutary solution. However, analysing application performance is mandatory for evaluating su...
Razvan Beuran, Ken-ichi Chinen, Khin Thida Latt, T...
ISEMANTICS
2010
13 years 10 months ago
Twarql: tapping into the wisdom of the crowd
Twarql is an infrastructure translating microblog posts from Twitter as Linked Open Data in real-time. The approach employed in Twarql can be summarized as follows: (1) extract co...
Pablo N. Mendes, Alexandre Passant, Pavan Kapanipa...
TKDE
2008
134views more  TKDE 2008»
13 years 8 months ago
Contraflow Transportation Network Reconfiguration for Evacuation Route Planning
Given a transportation network having source nodes with evacuees and destination nodes, we want to find a contraflow network configuration (that is, ideal direction for each edge) ...
Sangho Kim, Shashi Shekhar, Manki Min
JCM
2007
177views more  JCM 2007»
13 years 8 months ago
Collision Free MAC Protocols for Wireless Ad Hoc Networks based on BIBD Architecture
—Wireless Ad hoc networks represent a powerful telecommunication infrastructure that is being exploited for enabling general wireless networking connectivity for a variety of sig...
Pietro Camarda, Orazio Fiume