Sciweavers

468 search results - page 73 / 94
» Runtime Optimization of Application Level Communication Patt...
Sort
View
APCHI
2008
IEEE
14 years 2 months ago
On Generating Backbone Trees through Robust Multi-hop Clusters in Wireless Sensor Networks
Routing through a backbone, which is responsible for performing and managing multipoint communication, reduces the communication overhead and overall energy consumption in wireless...
Inyoung Shin, Moonseong Kim, Hyunseung Choo
ICC
2007
IEEE
141views Communications» more  ICC 2007»
14 years 1 months ago
Accurate Classification of the Internet Traffic Based on the SVM Method
ā€”The need to quickly and accurately classify Internet traffic for security and QoS control has been increasing significantly with the growing Internet traffic and applications ov...
Zhu Li, Ruixi Yuan, Xiaohong Guan
SACMAT
2011
ACM
12 years 10 months ago
An integrated approach for identity and access management in a SOA context
In this paper, we present an approach for identity and access management (IAM) in the context of (cross-organizational) serviceoriented architectures (SOA). In particular, we deļ¬...
Waldemar Hummer, Patrick Gaubatz, Mark Strembeck, ...
GECCO
2004
Springer
179views Optimization» more  GECCO 2004»
14 years 27 days ago
An Evolutionary Meta Hierarchical Scheduler for the Linux Operating System
Abstract. The need for supporting CSCW applications with heterogeneous and varying user requirements calls for adaptive and reconļ¬gurable schedulers accommodating a mixture of re...
Horst Wedde, Muddassar Farooq, Mario Lischka
MOBICOM
2006
ACM
14 years 1 months ago
Stochastic event capture using mobile sensors subject to a quality metric
Mobile sensors cover more area over a period of time than the same number of stationary sensors. However, the quality of coverage achieved by mobile sensors depends on the velocit...
Nabhendra Bisnik, Alhussein A. Abouzeid, Volkan Is...