Sciweavers

1109 search results - page 204 / 222
» Middleware for User Controlled Environments
Sort
View
TMC
2008
161views more  TMC 2008»
13 years 10 months ago
A New MAC Scheme Supporting Voice/Data Traffic in Wireless Ad Hoc Networks
Abstract--In wireless ad hoc networks, in addition to the well-known hidden terminal and exposed terminal problems, the locationdependent contention may cause serious unfairness an...
Ping Wang, Hai Jiang, Weihua Zhuang
JCP
2007
153views more  JCP 2007»
13 years 10 months ago
An Integrated Educational Platform Implementing Real, Remote Lab-Experiments for Electrical Engineering Courses
—This paper describes an Internet-based laboratory, named Remote Monitored and Controlled Laboratory (RMCLab) developed at University of Patras, Greece, for electrical engineerin...
Dimitris Karadimas, Kostas Efstathiou
CORR
2002
Springer
156views Education» more  CORR 2002»
13 years 10 months ago
MPICH-G2: A Grid-Enabled Implementation of the Message Passing Interface
Application development for distributed-computing ``Grids'' can benefit from tools that variously hide or enable application-level management of critical aspects of the ...
Nicholas T. Karonis, Brian R. Toonen, Ian T. Foste...
SPRINGSIM
2010
13 years 8 months ago
SES-based ontological process for high level information fusion
—Data Fusion (DF) process is in the interest of the military community since it provides the opportunity to achieve information superiority. The System Entity Structure (SES) is ...
Hojun Lee, Bernard P. Zeigler
IFIP
2010
Springer
13 years 8 months ago
Labeled VoIP Data-Set for Intrusion Detection Evaluation
Abstract. VoIP has become a major application of multimedia communications over IP. Many initiatives around the world focus on the detection of attacks against VoIP services and in...
Mohamed Nassar, Radu State, Olivier Festor