Sciweavers

903 search results - page 142 / 181
» Performance Evaluation of a Grid Computing Architecture Usin...
Sort
View
IMC
2010
ACM
13 years 5 months ago
Network tomography on correlated links
Network tomography establishes linear relationships between the characteristics of individual links and those of end-toend paths. It has been proved that these relationships can b...
Denisa Ghita, Katerina J. Argyraki, Patrick Thiran
DSN
2007
IEEE
14 years 2 months ago
Fault Tolerant Planning for Critical Robots
Autonomous robots offer alluring perspectives in numerous application domains: space rovers, satellites, medical assistants, tour guides, etc. However, a severe lack of trust in t...
Benjamin Lussier, Matthieu Gallien, Jér&eac...
IWCMC
2006
ACM
14 years 1 months ago
Tracers placement for IP traceback against DDoS attacks
This paper explores the tracers deployment problem for IP traceback methods how many and where the tracers should be deployed in the network to be effective for locating the attac...
Chun-Hsin Wang, Chang-Wu Yu, Chiu-Kuo Liang, Kun-M...
CODES
2006
IEEE
14 years 1 months ago
A run-time, feedback-based energy estimation model For embedded devices
We present an adaptive, feedback-based, energy estimation model for battery-powered embedded devices such as sensor network gateways and hand-held computers. Our technique maps ha...
Selim Gurun, Chandra Krintz
MOBIHOC
2008
ACM
14 years 7 months ago
Finding popular categories for RFID tags
As RFID tags are increasingly attached to everyday items, it quickly becomes impractical to collect data from every tag in order to extract useful information. In this paper, we c...
Bo Sheng, Chiu Chiang Tan, Qun Li, Weizhen Mao