Sciweavers

7943 search results - page 1521 / 1589
» A calculus for costed computations
Sort
View
SIGMETRICS
2006
ACM
104views Hardware» more  SIGMETRICS 2006»
15 years 4 months ago
Modeling adoptability of secure BGP protocols
Despite the existence of several secure BGP routing protocols, there has been little progress to date on actual adoption. Although feasibility for widespread adoption remains the ...
Haowen Chan, Debabrata Dash, Adrian Perrig, Hui Zh...
94
Voted
VEE
2006
ACM
106views Virtualization» more  VEE 2006»
15 years 4 months ago
Using VMM-based sensors to monitor honeypots
Virtual Machine Monitors (VMMs) are a common tool for implementing honeypots. In this paper we examine the implementation of a VMM-based intrusion detection and monitoring system ...
Kurniadi Asrigo, Lionel Litty, David Lie
VRST
2006
ACM
15 years 4 months ago
Simple user-generated motion cueing can enhance self-motion perception (Vection) in virtual reality
Despite amazing advances in the visual quality of virtual environments, affordable-yet-effective self-motion simulation still poses a major challenge. Using a standard psychophysi...
Bernhard E. Riecke
BROADNETS
2005
IEEE
15 years 3 months ago
Using location information for scheduling in 802.15.3 MAC
— In recent years, UWB has received much attention as a suitable Physical Layer (PHY) for Wireless Personal Area Networks (WPANS). UWB allows for low cost, low power, high bandwi...
Sethuram Balaji Kodeswaran, Anupam Joshi
BROADNETS
2005
IEEE
15 years 3 months ago
A Lightweight framework for source-to-sink data transfer in wireless sensor networks
— Lightweight protocols that are both bandwidth and power thrifty are desirable for sensor networks. In addition, for many sensor network applications, timeliness of data deliver...
James Jobin, Zhenqiang Ye, Honomount Rawat, Srikan...
« Prev « First page 1521 / 1589 Last » Next »