Sciweavers

373 search results - page 57 / 75
» Policy-Based Resource Assignment in Utility Computing Enviro...
Sort
View

Publication
145views
13 years 3 months ago
Wireless Client Puzzles in IEEE 802.11 Networks: Security by Wireless
Resource-depletion attacks against IEEE 802.11 access points (APs) are commonly executed by flooding APs with fake authentication requests. Such attacks may exhaust an AP’s memor...
Ivan Martinovic, Frank A. Zdarsky, Matthias Wilhel...
DSOM
2007
Springer
14 years 1 months ago
Virtualization-Based Techniques for Enabling Multi-tenant Management Tools
As service providers strive to improve the quality and efficiency of their IT (information technology) management services, the need to adopt a standard set of tools and processes...
Chang-Hao Tsai, Yaoping Ruan, Sambit Sahu, Anees S...
AICCSA
2001
IEEE
65views Hardware» more  AICCSA 2001»
13 years 11 months ago
Taxonomy of Process Modeling Languages
: A software process is defined as a description of various steps that must be carried out by process agents to pursue the goals of software engineering. To support a software proc...
Kamal Zuhairi Zamli, Peter Lee
CORR
2006
Springer
113views Education» more  CORR 2006»
13 years 7 months ago
Study of Self-Organization Model of Multiple Mobile Robot
: A good organization model of multiple mobile robot should be able to improve the efficiency of the system, reduce the complication of robot interactions, and detract the difficul...
Cheng Xian-Yi, Li Shu-Qin, Xian De-Shen
ICRA
2007
IEEE
99views Robotics» more  ICRA 2007»
14 years 1 months ago
RFID-Based Exploration for Large Robot Teams
Abstract— To coordinate a team of robots for exploration is a challenging problem, particularly in large areas as for example the devastated area after a disaster. This problem c...
Vittorio A. Ziparo, Alexander Kleiner, Bernhard Ne...