Sciweavers

347 search results - page 21 / 70
» Development of Threat Evaluation Tool for Distributed Networ...
Sort
View
VTC
2008
IEEE
127views Communications» more  VTC 2008»
14 years 1 months ago
On a Practical Distributed Source Coding Scheme for Wireless Sensor Networks
— We present a practical distributed source coding scheme for deployable wireless sensor networks. To the best of our knowledge it is the first-of-its-kind practical scheme impl...
Frank Oldewurtel, Marcin Foks, Petri Mähö...
HT
1997
ACM
13 years 11 months ago
Workspaces: The HyperDisco Approach to Internet Distribution
Hypermedia concepts are currently being deployed in a variety of information systems such as the World Wide Web, software development environments, large engineering enterprises, ...
Uffe Kock Wiil, John J. Leggett
WOSP
2005
ACM
14 years 27 days ago
Performance evaluation of UML software architectures with multiclass Queueing Network models
Software performance based on performance models can be applied at early phases of the software development cycle to characterize the quantitative behavior of software systems. We...
Simonetta Balsamo, Moreno Marzolla
ISSA
2008
13 years 8 months ago
The Information Security of a Bluetooth-Enabled Handheld Device
Bluetooth connectivity allows workers to access information anywhere, including both personal and corporate information. Software and applications have been specifically developed...
Frankie Tvrz, Marijke Coetzee
ICCS
2007
Springer
14 years 1 months ago
Cyberinfrastructure for Contamination Source Characterization in Water Distribution Systems
This paper describes a preliminary cyberinfrastructure for contaminant characterization in water distribution systems and its deployment on the grid. The cyberinfrastructure consis...
Sarat Sreepathi, Kumar Mahinthakumar, Emily M. Zec...