Sciweavers

280 search results - page 34 / 56
» Vulnerability Discovery Modeling Using Weibull Distribution
Sort
View
SSDBM
2003
IEEE
160views Database» more  SSDBM 2003»
14 years 29 days ago
The Virtual Data Grid: A New Model and Architecture for Data-Intensive Collaboration
It is now common to encounter communities engaged in the collaborative analysis and transformation of large quantities of data over extended time periods. We argue that these comm...
Ian T. Foster
ICDCS
2007
IEEE
14 years 2 months ago
mTreebone: A Hybrid Tree/Mesh Overlay for Application-Layer Live Video Multicast
Application-layer overlay networks have recently emerged as a promising solution for live media multicast on the Internet. A tree is probably the most natural structure for a mult...
Feng Wang, Yongqiang Xiong, Jiangchuan Liu
DSD
2008
IEEE
166views Hardware» more  DSD 2008»
14 years 2 months ago
Pearson - based Analysis of Positioning Error Distribution in Wireless Sensor Networks
Abstract—In two recent contributions [1], [2], we have provided a comparative analysis of various optimization algorithms, which can be used for atomic location estimation, and s...
Stefano Tennina, Marco Di Renzo, Fabio Graziosi, F...
ICSE
1999
IEEE-ACM
13 years 12 months ago
Information Survivability Control Systems
We address the dependence of critical infrastructures— including electric power, telecommunications, finance and transportation—on vulnerable information systems. Our approach...
Kevin J. Sullivan, John C. Knight, Xing Du, Steve ...
ICDCS
2003
IEEE
14 years 29 days ago
Cross-Feature Analysis for Detecting Ad-Hoc Routing Anomalies
With the proliferation of wireless devices, mobile ad hoc networking (MANET) has become a very exciting and important technology due to its characteristics of open medium and dyna...
Yi-an Huang, Wei Fan, Wenke Lee, Philip S. Yu