Sciweavers

1227 search results - page 164 / 246
» The Challenges of Application Service Hosting
Sort
View
152
Voted
TMC
2012
13 years 6 months ago
SenseLess: A Database-Driven White Spaces Network
The FCC ruling on Nov 4th, 2008 on white spaces has opened up the possibility of wireless network deployments over white spaces, i.e., vacant UHF TV channels. A key requirement fo...
Rohan Murty, Ranveer Chandra, Thomas Moscibroda, P...
170
Voted
CCS
2010
ACM
15 years 3 months ago
AccessMiner: using system-centric models for malware protection
Models based on system calls are a popular and common approach to characterize the run-time behavior of programs. For example, system calls are used by intrusion detection systems...
Andrea Lanzi, Davide Balzarotti, Christopher Krueg...
169
Voted
DMSN
2009
ACM
15 years 10 months ago
Message models and aggregation in knowledge based middleware for rich sensor systems
Networked, distributed real world sensing is an increasingly prominent topic in computing and has quickly expanded from resource constrained “sensor networks” measuring simple...
Joseph B. Kopena, William C. Regli, Boon Thau Loo
123
Voted
ISM
2008
IEEE
119views Multimedia» more  ISM 2008»
15 years 10 months ago
Evaluation of Error Resilience Mechanisms for 3G Conversational Video
Communication in 3G networks may experience packet losses due to transmission errors on the wireless link(s) which may severely impact the quality of conversational and streaming ...
Jegadish Devadoss, Varun Singh, Jörg Ott, Che...
124
Voted
ISJGP
2007
146views more  ISJGP 2007»
15 years 3 months ago
End-to-End Security Across Wired-Wireless Networks for Mobile Users
Abstract  Recent advances in mobile computing and wireless communication technologies are enabling high mobility and flexibility of anytime, anywhere service access for mobile us...
Sherali Zeadally, Nicolas Sklavos, Moganakrishnan ...