Sciweavers

998 search results - page 98 / 200
» Network Coding for Distributed Storage Systems
Sort
View
IPPS
2007
IEEE
14 years 3 months ago
An Approach to Detect Executable Content for Anomaly Based Network Intrusion Detection
Since current internet threats contain not only malicious codes like Trojan or worms, but also spyware and adware which do not have explicit illegal content, it is necessary to hav...
Like Zhang, Gregory B. White
MM
2004
ACM
124views Multimedia» more  MM 2004»
14 years 2 months ago
Exploiting content-based networking for video streaming
This technical demonstration shows that content-based networking is a promising technology for multireceiver video streaming. Each video receiver is provided with fine grained se...
Viktor S. Wold Eide, Frank Eliassen, Jørgen...
ICSE
2010
IEEE-ACM
13 years 11 months ago
Supporting developers with natural language queries
The feature list of modern IDEs is steadily growing and mastering these tools becomes more and more demanding, especially for novice programmers. Despite their remarkable capabili...
Michael Würsch, Giacomo Ghezzi, Gerald Reif, ...
MOBISYS
2009
ACM
14 years 9 months ago
Leakage-aware energy synchronization for wireless sensor networks
To ensure sustainable operations of wireless sensor systems, environmental energy harvesting has been regarded as the right solution for long-term applications. In energy-dynamic ...
Ting Zhu, Ziguo Zhong, Yu Gu, Tian He, Zhi-Li Zhan...
MIDDLEWARE
2007
Springer
14 years 3 months ago
Life cycle support for sensor network applications
Developing applications for sensor networks is a challenging task. Most programming systems narrowly focus on programming issues while ignoring that programming represents only a ...
Urs Bischoff, Gerd Kortuem