Sciweavers

2095 search results - page 374 / 419
» Modeling the Effects of Contention on the Performance of Het...
Sort
View
DEBU
2006
142views more  DEBU 2006»
13 years 8 months ago
Automated Storage Management with QoS Guarantee in Large-scale Virtualized Storage Systems
Storage virtualization in modern storage systems allows variability in the number of "physical" disks supporting a single "virtual" disk. In practice, IO workl...
Lin Qiao, Balakrishna R. Iyer, Divyakant Agrawal, ...
TWC
2008
156views more  TWC 2008»
13 years 8 months ago
Secure and Fault-Tolerant Event Boundary Detection in Wireless Sensor Networks
Event boundary detection is in and of itself a useful application in wireless sensor networks (WSNs). Typically, it includes the detection of a large-scale spatial phenomenon such ...
Kui Ren, Kai Zeng, Wenjing Lou
JCS
2010
80views more  JCS 2010»
13 years 3 months ago
Constraint differentiation: Search-space reduction for the constraint-based analysis of security protocols
We introduce constraint differentiation, a powerful technique for reducing search when model-checking security protocols using constraint-based methods. Constraint differentiation...
Sebastian Mödersheim, Luca Viganò, Dav...
TWC
2010
13 years 3 months ago
On the Efficacy of Frequency Hopping in Coping with Jamming Attacks in 802.11 Networks
Abstract--Frequency hopping (FH) has been the most popularly considered approach for alleviating the effects of jamming attacks. We re-examine, the efficacy of FH based on both exp...
Konstantinos Pelechrinis, Christos Koufogiannakis,...
MIR
2010
ACM
325views Multimedia» more  MIR 2010»
13 years 10 months ago
A classification-driven similarity matching framework for retrieval of biomedical images
This paper presents a classification-driven biomedical image retrieval system to bride the semantic gap by transforming image features to their global categories at different gran...
Md. Mahmudur Rahman, Sameer Antani, George R. Thom...