Sciweavers

1664 search results - page 318 / 333
» Making a Case for Multi-Agent Systems
Sort
View
RAID
2005
Springer
14 years 4 months ago
Sequence Number-Based MAC Address Spoof Detection
Abstract. The exponential growth in the deployment of IEEE 802.11based wireless LAN (WLAN) in enterprises and homes makes WLAN an attractive target for attackers. Attacks that expl...
Fanglu Guo, Tzi-cker Chiueh
ISPD
2004
ACM
146views Hardware» more  ISPD 2004»
14 years 4 months ago
Power-aware clock tree planning
Modern processors and SoCs require the adoption of poweroriented design styles, due to the implications that power consumption may have on reliability, cost and manufacturability ...
Monica Donno, Enrico Macii, Luca Mazzoni
CCS
2004
ACM
14 years 4 months ago
Privacy and security in library RFID: issues, practices, and architectures
We expose privacy issues related to Radio Frequency Identification (RFID) in libraries, describe current deployments, and suggest novel architectures for library RFID. Libraries ...
David Molnar, David Wagner
CCGRID
2003
IEEE
14 years 4 months ago
Scheduling Distributed Applications: the SimGrid Simulation Framework
— Since the advent of distributed computer systems an active field of research has been the investigation of scheduling strategies for parallel applications. The common approach...
Arnaud Legrand, Loris Marchal, Henri Casanova
HICSS
2003
IEEE
137views Biometrics» more  HICSS 2003»
14 years 4 months ago
Adjusting Safety Stock Requirements with an AHP-Based Risk Analysis
In most cases safety stock is determined based on the variability of the demand and lead time. The focus has been on the statistics and past performance, and the existing framewor...
Jukka Korpela, Antti Lehmusvaara, Kalevi Kylä...