Sciweavers

998 search results - page 163 / 200
» Networked Embedded Systems: A Quantitative Performance Compa...
Sort
View
WS
2004
ACM
15 years 8 months ago
SeRLoc: secure range-independent localization for wireless sensor networks
In many applications of wireless sensor networks (WSN), sensors are deployed un-tethered in hostile environments. For locationaware WSN applications, it is essential to ensure tha...
Loukas Lazos, Radha Poovendran
CSCW
2006
ACM
15 years 9 months ago
Effects of machine translation on collaborative work
Even though multilingual communities that use machine translation to overcome language barriers are increasing, we still lack a complete understanding of how machine translation a...
Naomi Yamashita, Toru Ishida
TSE
2011
114views more  TSE 2011»
14 years 10 months ago
Loupe: Verifying Publish-Subscribe Architectures with a Magnifying Lens
Abstract— The Publish-Subscribe (P/S) communication paradigm fosters high decoupling among distributed components. This facilitates the design of dynamic applications, but also i...
Luciano Baresi, Carlo Ghezzi, Luca Mottola
118
Voted
SECON
2008
IEEE
15 years 9 months ago
Fast Exclusion of Errant Devices from Vehicular Networks
—Vehicular networks, in which cars communicate wirelessly to exchange information on traffic conditions, offer a promising way to improve road safety. Yet ensuring the correct f...
Tyler Moore, Maxim Raya, Jolyon Clulow, Panagiotis...
142
Voted
TISSEC
2010
119views more  TISSEC 2010»
14 years 10 months ago
Storage-Based Intrusion Detection
Storage-based intrusion detection allows storage systems to transparently watch for suspicious activity. Storage systems are well-positioned to spot several common intruder action...
Adam G. Pennington, John Linwood Griffin, John S. ...