Sciweavers

2484 search results - page 349 / 497
» Polymatroids with Network Coding
Sort
View
DASC
2006
IEEE
14 years 2 months ago
On Recognizing Virtual Honeypots and Countermeasures
— Honeypots are decoys designed to trap, delay, and gather information about attackers. We can use honeypot logs to analyze attackers’ behaviors and design new defenses. A virt...
Xinwen Fu, Wei Yu, Dan Cheng, Xuejun Tan, Kevin St...
IDEAS
2006
IEEE
110views Database» more  IDEAS 2006»
14 years 2 months ago
Towards Traceability across Sovereign, Distributed RFID Databases
Tracking and tracing individual items is a new and emerging trend in many industries. Driven by maturing technologies such as Radio-Frequency Identification (RFID) and upcoming s...
Rakesh Agrawal, Alvin Cheung, Karin Kailing, Stefa...
ESCIENCE
2005
IEEE
14 years 1 months ago
The Common Instrument Middleware Architecture: Overview of Goals and Implementation
— Instruments and sensors and their accompanying actuators are essential to the conduct of scientific research. In many cases they provide observations in electronic format and ...
Tharaka Devadithya, Kenneth Chiu, Kianosh Huffman,...
ICDCS
2005
IEEE
14 years 1 months ago
Resource-Aware Distributed Stream Management Using Dynamic Overlays
We consider distributed applications that continuously stream data across the network, where data needs to be aggregated and processed to produce a 'useful' stream of up...
Vibhore Kumar, Brian F. Cooper, Zhongtang Cai, Gre...
ICC
2000
IEEE
14 years 16 days ago
A Framework for the Analysis of Adaptive Voice over IP
— In this paper, we present a framework for the analysis of a set of adaptive variable-bit-rate voice sources in a packet network. The instantaneous bit rate of each source is de...
Claudio Casetti, J. C. De Martin, Michela Meo