Sciweavers

2020 search results - page 363 / 404
» Modeling Probe-Agent Distributed System by Goal-oriented App...
Sort
View
COMPSAC
2008
IEEE
15 years 9 months ago
Measuring Network Security Using Bayesian Network-Based Attack Graphs
Given the increasing dependence of our societies on information systems, the overall security of these systems should be measured and improved. Existing work generally focuses on ...
Marcel Frigault, Lingyu Wang
HASE
2008
IEEE
15 years 9 months ago
Power Optimization in Fault-Tolerant Mobile Ad Hoc Networks
—In this paper, we investigate the transmission-power assignment problem for k-connected mobile ad hoc networks (MANETs), the problem of optimizing the lifetime of a MANET at a g...
Oliviero Riganelli, Radu Grosu, Samir R. Das, C. R...
SSDBM
2008
IEEE
177views Database» more  SSDBM 2008»
15 years 8 months ago
Prioritized Evaluation of Continuous Moving Queries over Streaming Locations
Abstract. Existing approaches to the management of streaming positional updates generally assume that all active user requests have equal importance, ignoring the possibility of an...
Kostas Patroumpas, Timos K. Sellis
107
Voted
VR
2007
IEEE
115views Virtual Reality» more  VR 2007»
15 years 8 months ago
Effective Cooperative Haptic Interaction over the Internet
We present a system that enables, for the first time, effective transatlantic cooperative haptic manipulation of objects whose motion is computed using a physically-based model. ...
Mashhuda Glencross, Caroline Jay, Jeff Feasel, Luv...
EDCC
2005
Springer
15 years 8 months ago
Gracefully Degrading Fair Exchange with Security Modules
The fair exchange problem is key to trading electronic items in systems of mutually untrusted parties. In modern variants of such systems, each party is equipped with a security mo...
Gildas Avoine, Felix C. Gärtner, Rachid Guerr...