Sciweavers

283 search results - page 34 / 57
» Exploiting Immunological Properties for Ubiquitous Computing...
Sort
View
APSCC
2008
IEEE
14 years 2 months ago
Runtime Prediction Based Grid Scheduling of Parameter Sweep Jobs
—This paper examines the problem of predicting job runtimes by exploiting the properties of parameter sweeps. A new parameter sweep prediction framework GIPSy (Grid Information P...
Sam Verboven, Peter Hellinckx, Frans Arickx, Jan B...
ICPR
2008
IEEE
14 years 2 months ago
A new spatial perceptual mask for image watermarking
This paper develops a new mask in the spatial domain for image watermarking. The mask exploits the properties of human visual system with respect to background luminance, the edge...
Xinshan Zhu
CMS
2006
175views Communications» more  CMS 2006»
13 years 9 months ago
Attack Graph Based Evaluation of Network Security
Abstract. The perspective directions in evaluating network security are simulating possible malefactor's actions, building the representation of these actions as attack graphs...
Igor V. Kotenko, Mikhail Stepashkin
MOBIHOC
2010
ACM
13 years 5 months ago
Data preservation under spatial failures in sensor networks
In this paper, we address the problem of preserving generated data in a sensor network in case of node failures. We focus on the type of node failures that have explicit spatial s...
Navid Hamed Azimi, Himanshu Gupta, Xiaoxiao Hou, J...
ICC
2009
IEEE
116views Communications» more  ICC 2009»
13 years 5 months ago
Efficient Implementation of Binary Sequence Generator for WiMAX and WRAN on Programmable Digital Signal Processor
In this paper, an efficient design for implementing binary sequence generator on 32-bit instruction execution mode TI TMS320C6416 DSP is presented. The main goal is to achieve high...
Lok Tiing Tie, Ser Wah Oh, K. J. M. Kua