Sciweavers

1646 search results - page 173 / 330
» Validation Measures in CMMI
Sort
View
CCGRID
2009
IEEE
14 years 4 months ago
Multicast Trees for Collaborative Applications
—Current implementations of real-time collaborative applications rely on a dedicated infrastructure to carry out all synchronizing and communication functions, and require all en...
Krzysztof Rzadca, Jackson Tan Teck Yong, Anwitaman...
EMS
2009
IEEE
14 years 4 months ago
Accurate Timeliness Simulations for Real-Time Wireless Sensor Networks
—The use of wireless sensor networks is rapidly growing in various types of applications that benefit from spatially distributed data collection. Some of these applications, suc...
Jérôme Rousselot, Jean-Dominique Deco...
GLOBECOM
2009
IEEE
14 years 4 months ago
Anonymous Cardinality Estimation in RFID Systems with Multiple Readers
— In this paper, we study the anonymous cardinality estimation problem in radio frequency identification (RFID) systems. To preserve privacy and anonymity, each tag only transmi...
Vahid Shah-Mansouri, Vincent W. S. Wong
IEEEIAS
2009
IEEE
14 years 3 months ago
Detecting Stepping-Stone Intruders with Long Connection Chains
: A common technique hacker use is to route their traffic through a chain of stepping-stone hosts. It is generally agreed that there is no valid reason to use a long connection cha...
Wei Ding, Matthew J. Hausknecht, Shou-Hsuan Stephe...
IROS
2009
IEEE
166views Robotics» more  IROS 2009»
14 years 3 months ago
2D micro teleoperation with force feedback
— This paper presents a 2D teleoperation task at microscales with force feedback. At this scale, two major problems arise while performing manipulation tasks: the lack of 3D real...
Aude Bolopion, Barthelemy Cagneau, Stephane R&eacu...