Sciweavers

1512 search results - page 231 / 303
» Principles of IEEE 802.11s
Sort
View
MSS
2003
IEEE
108views Hardware» more  MSS 2003»
14 years 3 months ago
Effective Management of Hierarchical Storage Using Two Levels of Data Clustering
When data resides on tertiary storage, clustering is the key to achieving high retrieval performance. However, a straightforward approach to clustering massive amounts of data on ...
Ratko Orlandic
PG
2003
IEEE
14 years 3 months ago
Physical Touch-Up of Human Motions
Many popular motion editing methods do not take physical principles into account potentially producing implausible motions. This paper introduces an efficient method for touching...
Hyun Joon Shin, Lucas Kovar, Michael Gleicher
RTCSA
2003
IEEE
14 years 3 months ago
Towards Aspectual Component-Based Development of Real-Time Systems
Increasing complexity of real-time systems, and demands for enabling their configurability and tailorability are strong motivations for applying new software engineering principle...
Aleksandra Tesanovic, Dag Nyström, Jörge...
RTSS
2003
IEEE
14 years 3 months ago
JAM: A Jammed-Area Mapping Service for Sensor Networks
Preventing denial-of-service attacks in wireless sensor networks is difficult primarily because of the limited resources available to network nodes and the ease with which attacks...
Anthony D. Wood, John A. Stankovic, Sang Hyuk Son
SP
2003
IEEE
107views Security Privacy» more  SP 2003»
14 years 3 months ago
Anomaly Detection Using Call Stack Information
The call stack of a program execution can be a very good information source for intrusion detection. There is no prior work on dynamically extracting information from call stack a...
Henry Hanping Feng, Oleg M. Kolesnikov, Prahlad Fo...