Sciweavers

6229 search results - page 1018 / 1246
» Models of Computation for Networks on Chip
Sort
View
IEEESP
2008
136views more  IEEESP 2008»
13 years 10 months ago
The Crutial Way of Critical Infrastructure Protection
Today, critical infrastructures like the power grid are essentially physical processes controlled by computers connected by networks. They are usually as vulnerable as any other i...
Alysson Neves Bessani, Paulo Sousa, Miguel Correia...
CN
2007
179views more  CN 2007»
13 years 10 months ago
Protecting host-based intrusion detectors through virtual machines
: Intrusion detection systems continuously watch the activity of a network or computer, looking for attack or intrusion evidences. However, hostbased intrusion detectors are partic...
Marcos Laureano, Carlos Maziero, Edgard Jamhour
WINET
2002
166views more  WINET 2002»
13 years 10 months ago
The Anatomy of a Context-Aware Application
We describe a platform for context-aware computing which enables applications to follow mobile users as they move around a building. The platform is particularly suitable for rich...
Andy Harter, Andy Hopper, Pete Steggles, Andy Ward...
CSCWD
2009
Springer
13 years 8 months ago
The analysis and development of Taiwan's industrial logistics hubs
With the trend of globalization, enterprises require to extend their logistics scope from domestic to international, integrate logistics networks, and improve the agility and effi...
Charles V. Trappey, Amy J. C. Trappey, Gilbert Y. ...
DCC
2009
IEEE
13 years 8 months ago
Wireless Video Transmission: A Single Layer Distortion Optimal Approach
In this paper, we introduce an analytical expression for the expected distortion of a single layer encoded video bit-stream. Based on the expected distortion model, we propose a d...
Negar Nejati, Homayoun Yousefi'zadeh, Hamid Jafark...
« Prev « First page 1018 / 1246 Last » Next »