Sciweavers

1661 search results - page 220 / 333
» Distributed Top-K Monitoring
Sort
View
ICDCS
2006
IEEE
15 years 8 months ago
Detecting MAC Layer Back-off Timer Violations in Mobile Ad Hoc Networks
In IEEE 802.11 based ad hoc networks, by simply manipulating the back-off timers and/or wait times prior to transmission, malicious nodes can cause a drastically reduced allocatio...
Venkata Nishanth Lolla, Lap Kong Law, Srikanth V. ...
135
Voted
ICPPW
2006
IEEE
15 years 8 months ago
Robust Resource Allocation in Weather Data Processing Systems
Reliability of weather data processing systems is of prime importance to ensure the efficient operation of space-based weather monitoring systems. This work defines a heterogeneou...
Mohana Oltikar, Jeff Brateman, Joe White, Jon Mart...
ICPPW
2006
IEEE
15 years 8 months ago
Energy Minimization and Reliability for Wearable Medical Applications
Wearable medical systems, which are used for medical monitoring, assessment, and/or treatment have the essential requirements to be low energy consuming and reliable. They must be...
Ani Nahapetian, Foad Dabiri, Majid Sarrafzadeh
IPPS
2006
IEEE
15 years 8 months ago
On-the-fly kernel updates for high-performance computing clusters
High-performance computing clusters running longlived tasks currently cannot have kernel software updates applied to them without causing system downtime. These clusters miss oppo...
Kristis Makris, Kyung Dong Ryu
SUTC
2006
IEEE
15 years 8 months ago
An Authentication Service Based on Trust and Clustering in Wireless Ad Hoc Networks: Description and Security Evaluation
Security in wireless ad hoc networks is hard to achieve due to the vulnerability of its links, limited physical protection, and the absence of a centralized management point. Cons...
Edith C. H. Ngai, Michael R. Lyu