Sciweavers

2503 search results - page 259 / 501
» Building Computer Network Attacks
Sort
View
ISCA
1998
IEEE
122views Hardware» more  ISCA 1998»
15 years 6 months ago
Design Choices in the SHRIMP System: An Empirical Study
The SHRIMP cluster-computing system has progressed to a point of relative maturity; a variety of applications are running on a 16-node system. We have enough experience to underst...
Matthias A. Blumrich, Richard Alpert, Yuqun Chen, ...
ICCV
2007
IEEE
15 years 8 months ago
Automatic Camera Network Localization using Object Image Tracks
Camera networks are being used in more applications as different types of sensor networks are used to instrument large spaces. Here we show a method for localizing the cameras in ...
Marci Meingast, Songhwai Oh, Shankar Sastry
NCA
2003
IEEE
15 years 7 months ago
Performance analysis for a DiffServ-enabled network: The case of Relative Service
A lot of research work has recently focused on the exploitation of the DiffServ framework towards building reliable networking services that provide deterministic quality guarante...
Christos Bouras, Afrodite Sevasti
IJON
2007
84views more  IJON 2007»
15 years 1 months ago
Modeling self-developing biological neural networks
Recent progress in chips–neuron interface suggests real biological neurons as long-term alternatives to silicon transistors. The first step ning such computing systems is to bu...
Hugues Berry, Olivier Temam
FTDCS
2004
IEEE
15 years 5 months ago
Random Landmarking in Mobile, Topology-Aware Peer-to-Peer Networks
DHTs can locate objects in a peer-to-peer network within an efficient amount of overlay hops. Since an overlay hop is likely to consist of multiple physical hops, the ratio betwee...
Rolf Winter, Thomas Zahn, Jochen H. Schiller