Sciweavers

5234 search results - page 1012 / 1047
» Simulation of Computer Network Attacks
Sort
View
IJWMC
2010
103views more  IJWMC 2010»
14 years 11 months ago
Programmable agents for efficient topology formation of Bluetooth scatternets
The past few years have seen a burst in public interest and widespread use of portable electronic devices featuring both mature and emerging technologies for wireless communication...
Sergio González-Valenzuela, Son T. Vuong, V...
CORR
2010
Springer
142views Education» more  CORR 2010»
14 years 9 months ago
On the Benefit of Virtualization: Strategies for Flexible Server Allocation
Abstract--Virtualization technology facilitates a dynamic, demanddriven allocation and migration of servers. This paper studies how the flexibility offered by network virtualizatio...
Dushyant Arora, Anja Feldmann, Gregor Schaffrath, ...
ICASSP
2010
IEEE
14 years 9 months ago
Performance of shockwave-based shooter localization under model misspecification
This paper considers the estimation of shooter locations using a sensor network where each sensor measures the time difference between receptions of a firearm's muzzle blast ...
Joshua N. Ash, Gene T. Whipps, Richard J. Kozick
TON
2010
188views more  TON 2010»
14 years 9 months ago
Self-Chord: A Bio-Inspired P2P Framework for Self-Organizing Distributed Systems
This paper presents "Self-Chord," a peer-to-peer (P2P) system that inherits the ability of Chord-like structured systems for the construction and maintenance of an overla...
Agostino Forestiero, Emilio Leonardi, Carlo Mastro...
TSMC
2010
14 years 9 months ago
Efficient Sensor Selection for Active Information Fusion
In our previous paper [1], we formalized an active information fusion framework based on dynamic Bayesian networks to provide active information fusion. This paper focuses on a ce...
Yongmian Zhang, Qiang Ji
« Prev « First page 1012 / 1047 Last » Next »