Sciweavers

347 search results - page 45 / 70
» Proactive Computing
Sort
View
ICDCS
2008
IEEE
14 years 4 months ago
Mobile Filtering for Error-Bounded Data Collection in Sensor Networks
In wireless sensor networks, filters, which suppress data update reports within predefined error bounds, effectively reduce the traffic volume for continuous data collection. A...
Dan Wang, Jianliang Xu, Jiangchuan Liu, Feng Wang
ICDCSW
2008
IEEE
14 years 4 months ago
RETROFIT: Reliable Exchanges through Resilient Overlays for Internet Teleoperation
Emergence of successful teleoperation applications requires the convergence of diverse domains like robotics, machine learning, sensing, actuation, control and communication. We e...
Invited Talk Lakshamanan, Raj Rajkumar
DSN
2007
IEEE
14 years 4 months ago
A Fast Rejuvenation Technique for Server Consolidation with Virtual Machines
As server consolidation using virtual machines (VMs) is carried out, software aging of virtual machine monitors (VMMs) is becoming critical. Performance degradation or crash failu...
Kenichi Kourai, Shigeru Chiba
IEEESCC
2007
IEEE
14 years 4 months ago
Enabling User Control with Personal Identity Management
Being proactive and vigilant is the best defense against identity theft and the invasion of privacy. This recurrent advice from the public broadcasting attests that security breac...
Ty Mey Eap, Marek Hatala, Dragan Gasevic
IPPS
2007
IEEE
14 years 4 months ago
Security Threat Prediction in a Local Area Network Using Statistical Model
In today’s large and complex network scenario vulnerability scanners play a major role from security perspective by proactively identifying the known security problems or vulner...
Somak Bhattacharya, S. K. Ghosh