Sciweavers

417 search results - page 32 / 84
» Experimental Evaluation of Memory Management in Content-Cent...
Sort
View
IAW
2003
IEEE
14 years 28 days ago
Security Vulnerabilities in Command and Control Interoperability
- This paper will outline issues associated with communication system interoperability, the security vulnerabilities associated with improved interoperability, network simulation t...
John A. Hamilton Jr.
ICMCS
2007
IEEE
106views Multimedia» more  ICMCS 2007»
14 years 1 months ago
Toward Self-Managed Media Stream Processing Service Overlays
On-demand media stream processing service provisioning on top of a service overlay network (SON) has emerged as a promising approach to providing quality-aware and failure-resilie...
Xiaohui Gu, Philip S. Yu
LCN
2007
IEEE
14 years 1 months ago
Lightpath Reconfiguration in Regional IP-over-WDM Networks by a Centralized Control System
—Lightpath reconfiguration performance has been evaluated experimentally for regional IP-over-WDM network applications, making the network scalable and stable when traffic change...
Yutaka Katsuyama, Michio Hashimoto, Keiji Nishikaw...
MIS
2011
Springer
256views Multimedia» more  MIS 2011»
13 years 2 months ago
Event sharing in vehicular networks using geographic vectors and maps
By exchanging events in a vehicular ad hoc network (VANET), drivers can receive information that allows them to find relevant places (e.g., parking spaces) or avoid dangerous/unde...
Thierry Delot, Sergio Ilarri, Nicolas Cenerario, T...
SENSYS
2006
ACM
14 years 1 months ago
Capsule: an energy-optimized object storage system for memory-constrained sensor devices
Recent gains in energy-efficiency of new-generation NAND flash storage have strengthened the case for in-network storage by data-centric sensor network applications. This paper ...
Gaurav Mathur, Peter Desnoyers, Deepak Ganesan, Pr...