Sciweavers

483 search results - page 91 / 97
» A Method to Implement a Denial of Service Protection Base
Sort
View
SIGMOD
2007
ACM
413views Database» more  SIGMOD 2007»
15 years 9 months ago
Effective keyword-based selection of relational databases
The wide popularity of free-and-easy keyword based searches over World Wide Web has fueled the demand for incorporating keyword-based search over structured databases. However, mo...
Bei Yu, Guoliang Li, Karen R. Sollins, Anthony K. ...
MOBIHOC
2008
ACM
15 years 9 months ago
P2P-based routing and data management using the virtual cord protocol (VCP)
We present Virtual Cord Protocol (VCP), a virtual relative position based routing protocol for sensor networks that also provides methods for data management as known from standar...
Abdalkarim Awad, Reinhard German, Falko Dressler
DATE
2009
IEEE
121views Hardware» more  DATE 2009»
15 years 4 months ago
Remote measurement of local oscillator drifts in FlexRay networks
—Distributed systems, especially time-triggered ones, are implementing clock synchronization algorithms to provide and maintain a common view of time among the different nodes. S...
Eric Armengaud, Andreas Steininger
EPEW
2009
Springer
15 years 4 months ago
Performance of Auctions and Sealed Bids
We develop models of automated E-commerce techniques, which predict the economic outcomes of these decision mechanisms, including the price attained by a good and the resulting inc...
Erol Gelenbe, László Györfi
HUC
2004
Springer
15 years 2 months ago
Particle Filters for Location Estimation in Ubiquitous Computing: A Case Study
Location estimation is an important part of many ubiquitous computing systems. Particle filters are simulation-based probabilistic approximations which the robotics community has ...
Jeffrey Hightower, Gaetano Borriello