Sciweavers

2722 search results - page 468 / 545
» Hastily formed networks
Sort
View
WOSP
2005
ACM
14 years 4 months ago
Performance characterization of decentralized algorithms for replica selection in distributed object systems
Designers of distributed systems often rely on replicas for increased robustness, scalability, and performance. Replicated server architectures require some technique to select a ...
Ceryen Tan, Kevin Mills
WS
2005
ACM
14 years 4 months ago
Strengthening EPC tags against cloning
The EPC (Electronic Product Code) tag is a form of RFID (Radio-Frequency IDentification) device that is emerging as a successor to the printed barcode. Like barcodes, EPC tags emi...
Ari Juels
HIP
2005
Springer
208views Cryptology» more  HIP 2005»
14 years 4 months ago
Phish and HIPs: Human Interactive Proofs to Detect Phishing Attacks
In this paper, we propose a new class of Human Interactive Proofs (HIPs) that allow a human to distinguish one computer from another. Unlike traditional HIPs, where the computer is...
Rachna Dhamija, J. D. Tygar
HPCC
2005
Springer
14 years 4 months ago
Adaptive Buffering-Based on Handoff Prediction for Wireless Internet Continuous Services
New challenging deployment scenarios are accommodating portable devices with limited and heterogeneous capabilities that roam among wireless access localities during service provis...
Paolo Bellavista, Antonio Corradi, Carlo Giannelli
ICANN
2005
Springer
14 years 4 months ago
Self Organizing Map (SOM) Approach for Classification of Power Quality Events
In this work, Self Organizing Map (SOM) is used in order to classify the types of defections in electrical systems, known as Power Quality (PQ) events. The features for classificat...
Emin Germen, Dogãn Gökhan Ece, Öm...