Sciweavers

219 search results - page 43 / 44
» Survivable network design with degree or order constraints
Sort
View
BSN
2006
IEEE
131views Sensor Networks» more  BSN 2006»
14 years 8 days ago
Elaborating Sensor Data using Temporal and Spatial Commonsense Reasoning
Ubiquitous computing has established a vision of computation where computers are so deeply integrated into our lives that they become both invisible and everywhere. In order to ha...
Bo Morgan, Push Singh
GLOBECOM
2006
IEEE
14 years 8 days ago
Linear Coherent Decentralized Estimation
Abstract—We consider the distributed estimation of an unknown vector signal in a resource constrained sensor network with a fusion center. Due to power and bandwidth limitations,...
Jinjun Xiao, Shuguang Cui, Zhi-Quan Luo, Andrea J....
MMMACNS
2005
Springer
13 years 11 months ago
A Modal Logic for Role-Based Access Control
Making correct access-control decisions is central to security, which in turn requires accounting correctly for the identity, credentials, roles, authority, and privileges of users...
Thumrongsak Kosiyatrakul, Susan Older, Shiu-Kai Ch...
ICS
2005
Tsinghua U.
13 years 11 months ago
Continuous Replica Placement schemes in distributed systems
The Replica Placement Problem (RPP) aims at creating a set of duplicated data objects across the nodes of a distributed system in order to optimize certain criteria. Typically, RP...
Thanasis Loukopoulos, Petros Lampsas, Ishfaq Ahmad
CASCON
1996
126views Education» more  CASCON 1996»
13 years 7 months ago
Evaluating the costs of management: a distributed applications management testbed
In today's distributed computing environments, users are makingincreasing demands on the systems, networks, and applications they use. Users are coming to expect performance,...
Michael Katchabaw, Stephen L. Howard, Andrew D. Ma...