Sciweavers

2014 search results - page 379 / 403
» Network Management Challenges for Next Generation Networks
Sort
View
JHSN
2006
95views more  JHSN 2006»
13 years 9 months ago
IPsec/VPN security policy correctness and assurance
: With IPSec/VPN policies being widely deployed, how to correctly specify and configure them is critical in enforcing security requirements. Under current practice, IPSec/VPN polic...
Yanyan Yang, Charles U. Martel, Zhi (Judy) Fu, Shy...
TROB
2008
146views more  TROB 2008»
13 years 8 months ago
Mapping a Suburb With a Single Camera Using a Biologically Inspired SLAM System
This paper describes a biologically inspired approach to vision-only simultaneous localization and mapping (SLAM) on ground-based platforms. The core SLAM system, dubbed RatSLAM, i...
Michael Milford, Gordon Wyeth
ICDE
2009
IEEE
178views Database» more  ICDE 2009»
13 years 6 months ago
Efficient Query Evaluation over Temporally Correlated Probabilistic Streams
Many real world applications such as sensor networks and other monitoring applications naturally generate probabilistic streams that are highly correlated in both time and space. ...
Bhargav Kanagal, Amol Deshpande
IUI
2012
ACM
12 years 4 months ago
Summarizing sporting events using twitter
The status updates posted to social networks, such as Twitter and Facebook, contain a myriad of information about what people are doing and watching. During events, such as sports...
Jeffrey Nichols, Jalal Mahmud, Clemens Drews
SIGMOD
2007
ACM
167views Database» more  SIGMOD 2007»
14 years 9 months ago
Data currency in replicated DHTs
Distributed Hash Tables (DHTs) provide a scalable solution for data sharing in P2P systems. To ensure high data availability, DHTs typically rely on data replication, yet without ...
Reza Akbarinia, Esther Pacitti, Patrick Valduriez