Sciweavers

1266 search results - page 189 / 254
» Threat Evaluation Method for Distributed Network Environment
Sort
View
FAST
2010
15 years 6 months ago
Discovery of Application Workloads from Network File Traces
An understanding of application I/O access patterns is useful in several situations. First, gaining insight into what applications are doing with their data at a semantic level he...
Neeraja J. Yadwadkar, Chiranjib Bhattacharyya, K. ...
INFOCOM
2006
IEEE
15 years 10 months ago
Supporting Secure Communication and Data Collection in Mobile Sensor Networks
— Sensor deployments may be static, but researchers have recently been making a case for mobile collector nodes to enhance data acquisition. Since mobile nodes are often more pri...
Li Zhou, Jinfeng Ni, Chinya V. Ravishankar
TNN
2010
173views Management» more  TNN 2010»
14 years 10 months ago
Global synchronization for discrete-time stochastic complex networks with randomly occurred nonlinearities and mixed time delays
Abstract--In this paper, the problem of stochastic synchronization analysis is investigated for a new array of coupled discretetime stochastic complex networks with randomly occurr...
Zidong Wang, Yao Wang, Yurong Liu
AINA
2009
IEEE
15 years 8 months ago
Layer-Based Dome Contents Creation Using Scenario Description Language
—In recent years, dome display has become popular, and it is desired to establish a method to create dome image contents easily. In this study, psychophysical experiment was cond...
Tetsuro Ogi, Daisuke Furuyama, Tetsuro Fujise
142
Voted
ISQED
2007
IEEE
127views Hardware» more  ISQED 2007»
15 years 10 months ago
Sensitivity Based Link Insertion for Variation Tolerant Clock Network Synthesis
Clock distribution is one of the key limiting factors in any high speed, sub-100nm VLSI design. Unwanted clock skews, caused by variation effects like manufacturing variations, po...
Joon-Sung Yang, Anand Rajaram, Ninghy Shi, Jian Ch...