Sciweavers

307 search results - page 30 / 62
» Distributed Source Control: A Network Access Control for Int...
Sort
View
ICDCS
2007
IEEE
13 years 11 months ago
Efficient Execution of Continuous Incoherency Bounded Queries over Multi-Source Streaming Data
On-line decision making often involves query processing over time-varying data which arrives in the form of data streams from distributed locations. In such environments typically...
Manish Bhide, Krithi Ramamritham, Mukund Agrawal
ICC
2007
IEEE
13 years 11 months ago
Towards an Integrated Design Approach to Specknets
The Research Consortium in Speckled Computing is a multidisciplinary grouping of computer scientists, electronic engineers, physicists and electrochemists with the aim of realising...
D. K. Arvind, K. Elgaid, T. Krauss, A. Paterson, R...
ACHI
2009
IEEE
14 years 2 months ago
Networked Haptic Cooperation Using Remote Dynamic Proxies
Networked haptic cooperation entails direct interaction among users as well as joint manipulation of virtual objects. To increase the realism of both types of interactions, this p...
Zhi Li, Daniela Constantinescu
INTERSENSE
2006
ACM
14 years 1 months ago
QoS-aware mesh construction to enhance multicast routing in mobile ad hoc networks
— Mobile Ad-hoc Networks (MANETs) are seen as an essential technology to support future Pervasive Computing Scenarios and 4G networks. In a MANET, efficient support of multipoint...
Harald Tebbe, Andreas J. Kassler, Pedro M. Ruiz
TMC
2010
179views more  TMC 2010»
13 years 6 months ago
On Fast and Accurate Detection of Unauthorized Wireless Access Points Using Clock Skews
We explore the use of clock skew of a wireless local area network access point (AP) as its fingerprint to detect unauthorized APs quickly and accurately. The main goal behind usi...
Suman Jana, Sneha Kumar Kasera