Sciweavers

373 search results - page 57 / 75
» Policy-Based Resource Assignment in Utility Computing Enviro...
Sort
View

Publication
145views
14 years 10 months ago
Wireless Client Puzzles in IEEE 802.11 Networks: Security by Wireless
Resource-depletion attacks against IEEE 802.11 access points (APs) are commonly executed by flooding APs with fake authentication requests. Such attacks may exhaust an AP’s memor...
Ivan Martinovic, Frank A. Zdarsky, Matthias Wilhel...
DSOM
2007
Springer
15 years 8 months ago
Virtualization-Based Techniques for Enabling Multi-tenant Management Tools
As service providers strive to improve the quality and efficiency of their IT (information technology) management services, the need to adopt a standard set of tools and processes...
Chang-Hao Tsai, Yaoping Ruan, Sambit Sahu, Anees S...
115
Voted
AICCSA
2001
IEEE
65views Hardware» more  AICCSA 2001»
15 years 6 months ago
Taxonomy of Process Modeling Languages
: A software process is defined as a description of various steps that must be carried out by process agents to pursue the goals of software engineering. To support a software proc...
Kamal Zuhairi Zamli, Peter Lee
100
Voted
CORR
2006
Springer
113views Education» more  CORR 2006»
15 years 2 months ago
Study of Self-Organization Model of Multiple Mobile Robot
: A good organization model of multiple mobile robot should be able to improve the efficiency of the system, reduce the complication of robot interactions, and detract the difficul...
Cheng Xian-Yi, Li Shu-Qin, Xian De-Shen
98
Voted
ICRA
2007
IEEE
99views Robotics» more  ICRA 2007»
15 years 8 months ago
RFID-Based Exploration for Large Robot Teams
Abstract— To coordinate a team of robots for exploration is a challenging problem, particularly in large areas as for example the devastated area after a disaster. This problem c...
Vittorio A. Ziparo, Alexander Kleiner, Bernhard Ne...