Sciweavers

359 search results - page 64 / 72
» The Impact of Using Multiple Antennas on Wireless Localizati...
Sort
View
DSN
2005
IEEE
14 years 2 months ago
ADEPTS: Adaptive Intrusion Response Using Attack Graphs in an E-Commerce Environment
Distributed systems with multiple interacting services, such as distributed e-commerce systems, are suitable targets for malicious attacks because of the potential financial impac...
Bingrui Foo, Yu-Sung Wu, Yu-Chun Mao, Saurabh Bagc...
IPPS
2007
IEEE
14 years 3 months ago
Packet Reordering in Network Processors
Network processors today consists of multiple parallel processors (microengines) with support for multiple threads to exploit packet level parallelism inherent in network workload...
S. Govind, R. Govindarajan, Joy Kuri
ECIR
2004
Springer
13 years 10 months ago
Answer Selection in a Multi-stream Open Domain Question Answering System
Abstract. Question answering systems aim to meet users' information needs by returning exact answers in response to a question. Traditional open domain question answering syst...
Valentin Jijkoun, Maarten de Rijke
MMNS
2001
151views Multimedia» more  MMNS 2001»
13 years 10 months ago
Analysis of Random Access Protocol under Bursty Traffic
Aloha-type random-access protocols have been employed as access control protocols in wireline and wireless, stationary and mobile, multiple-access communications networks. They are...
Jianbo Gao, Izhak Rubin
ADHOCNOW
2009
Springer
14 years 3 months ago
SenSearch: GPS and Witness Assisted Tracking for Delay Tolerant Sensor Networks
Abstract— Mobile wireless sensor networks have to be robust against the limitations of the underlying platform. While lightweight form factor makes them an attractive choice for ...
Lun Jiang, Jyh-How Huang, Ankur Kamthe, Tao Liu, I...