Sciweavers

196 search results - page 32 / 40
» Sensor Selection for IT Infrastructure Monitoring
Sort
View
ISCA
2007
IEEE
114views Hardware» more  ISCA 2007»
14 years 2 months ago
Mechanisms for bounding vulnerabilities of processor structures
Concern for the increasing susceptibility of processor structures to transient errors has led to several recent research efforts that propose architectural techniques to enhance r...
Niranjan Soundararajan, Angshuman Parashar, Anand ...
INFOCOM
2006
IEEE
14 years 1 months ago
Mobile Emulab: A Robotic Wireless and Sensor Network Testbed
Abstract— Simulation has been the dominant research methodology in wireless and sensor networking. When mobility is added, real-world experimentation is especially rare. However,...
David Johnson, Tim Stack, Russ Fish, Daniel Montra...
IEEEIAS
2008
IEEE
14 years 2 months ago
Operator-Centric and Adaptive Intrusion Detection
: An intrusion detection system should support the operator of the system. Thus, in addition to producing alerts, it should allow for easy insertion of new detection algorithms. It...
Ulf Larson, Stefan Lindskog, Dennis K. Nilsson, Er...
CORR
2008
Springer
60views Education» more  CORR 2008»
13 years 7 months ago
Enhanced Sensing Characteristics in MEMS-based Formaldehyde Gas Sensor
In this study, the proposed sensor integrates a sensing layer, a heating device, and electrodes on the substrate. The micro heater is integrated in the sensor to provide instantan...
Yu-Hsiang Wang, C.-C. Hsiao, Chia-Yen Lee, Rong-Hu...
INFOCOM
2012
IEEE
11 years 10 months ago
Di-Sec: A distributed security framework for heterogeneous Wireless Sensor Networks
Wireless Sensor Networks (WSNs) are no longer a nascent technology and today, they are actively deployed as a viable technology in many diverse application domains such as health ...
Marco Valero, Sang Shin Jung, A. Selcuk Uluagac, Y...