Sciweavers

147 search results - page 18 / 30
» M-BISON: Microarray-based integration of data sources using ...
Sort
View
IPPS
2008
IEEE
14 years 1 months ago
A wireless sensor network based closed-loop system for subsurface contaminant plume monitoring
A closed-loop contaminant plume monitoring system is being developed that integrates wireless sensor network based monitoring with numerical models for subsurface plumes. The syst...
Qi Han, Anura P. Jayasumana, Tissa H. Illangasekar...
INFOCOM
2009
IEEE
14 years 2 months ago
Null Keys: Limiting Malicious Attacks Via Null Space Properties of Network Coding
—The performance of randomized network coding can suffer significantly when malicious nodes corrupt the content of the exchanged blocks. Previous work have introduced error corr...
Elias Kehdi, Baochun Li
ICN
2007
Springer
14 years 1 months ago
Distance-Dependent RED Policy (DDRED)
— The network quality of service (QoS) and the congestion control of the transport protocol are important parameters for the performance of a network data transfer. To this end, ...
Sebastien Linck, Eugen Dedu, François Spies
ESWS
2010
Springer
14 years 9 days ago
Semantics, Sensors, and the Social Web: The Live Social Semantics Experiments
Abstract. The Live Social Semantics is an innovative application that encourages and guides social networking between researchers at conferences and similar events. The application...
Martin Szomszor, Ciro Cattuto, Wouter Van den Broe...
GI
2009
Springer
13 years 5 months ago
Service-oriented Event Assessment - Closing the Gap of IT Security Compliance Management
: Frequently, Security Monitoring is equated with network intrusion detection. However, Security Monitoring has a much broader scope. It also comprises detection of insider attacks...
Frederic Majer, Martin Nussbaumer, Dieter Riexinge...