Sciweavers

998 search results - page 163 / 200
» Networked Embedded Systems: A Quantitative Performance Compa...
Sort
View
WS
2004
ACM
14 years 1 months ago
SeRLoc: secure range-independent localization for wireless sensor networks
In many applications of wireless sensor networks (WSN), sensors are deployed un-tethered in hostile environments. For locationaware WSN applications, it is essential to ensure tha...
Loukas Lazos, Radha Poovendran
CSCW
2006
ACM
14 years 2 months ago
Effects of machine translation on collaborative work
Even though multilingual communities that use machine translation to overcome language barriers are increasing, we still lack a complete understanding of how machine translation a...
Naomi Yamashita, Toru Ishida
TSE
2011
114views more  TSE 2011»
13 years 3 months ago
Loupe: Verifying Publish-Subscribe Architectures with a Magnifying Lens
Abstract— The Publish-Subscribe (P/S) communication paradigm fosters high decoupling among distributed components. This facilitates the design of dynamic applications, but also i...
Luciano Baresi, Carlo Ghezzi, Luca Mottola
SECON
2008
IEEE
14 years 2 months ago
Fast Exclusion of Errant Devices from Vehicular Networks
—Vehicular networks, in which cars communicate wirelessly to exchange information on traffic conditions, offer a promising way to improve road safety. Yet ensuring the correct f...
Tyler Moore, Maxim Raya, Jolyon Clulow, Panagiotis...
TISSEC
2010
119views more  TISSEC 2010»
13 years 3 months ago
Storage-Based Intrusion Detection
Storage-based intrusion detection allows storage systems to transparently watch for suspicious activity. Storage systems are well-positioned to spot several common intruder action...
Adam G. Pennington, John Linwood Griffin, John S. ...