Sciweavers

523 search results - page 48 / 105
» A simulation model for military deployment
Sort
View
128
Voted
AINA
2010
IEEE
15 years 5 months ago
CloudAnalyst: A CloudSim-Based Visual Modeller for Analysing Cloud Computing Environments and Applications
—Advances in Cloud computing enable new possibilities to Internet applications developers. Previously, the main concern of Internet applications developers was deployment and hos...
Bhathiya Wickremasinghe, Rodrigo N. Calheiros, Raj...
SP
2007
IEEE
108views Security Privacy» more  SP 2007»
15 years 6 months ago
Trojan Detection using IC Fingerprinting
Hardware manufacturers are increasingly outsourcing their IC fabrication work overseas due to much lower costs. This poses a significant security risk for ICs used for critical m...
Dakshi Agrawal, Selçuk Baktir, Deniz Karako...
95
Voted
NCA
2003
IEEE
15 years 5 months ago
Performance analysis for a DiffServ-enabled network: The case of Relative Service
A lot of research work has recently focused on the exploitation of the DiffServ framework towards building reliable networking services that provide deterministic quality guarante...
Christos Bouras, Afrodite Sevasti
95
Voted
INFOCOM
2009
IEEE
15 years 7 months ago
Surface Coverage in Wireless Sensor Networks
—Coverage is a fundamental problem in Wireless Sensor Networks (WSNs). Existing studies on this topic focus on 2D ideal plane coverage and 3D full space coverage. In many real wo...
Ming-Chen Zhao, Jiayin Lei, Min-You Wu, Yunhuai Li...
ICN
2007
Springer
15 years 6 months ago
Scalability of the OLSR Protocol with the Fish Eye Extension
— Multi-hop wireless ad-hoc networks are drawing more and more attention from both academic and industrial research. The lack of infrastructure makes those networks easy to deplo...
Dang Nguyen, Pascale Minet