Sciweavers

10182 search results - page 1950 / 2037
» Case Studies
Sort
View
SUTC
2008
IEEE
15 years 8 months ago
Training Data Compression Algorithms and Reliability in Large Wireless Sensor Networks
With the availability of low-cost sensor nodes there have been many standards developed to integrate and network these nodes to form a reliable network allowing many different typ...
Vasanth Iyer, Rammurthy Garimella, M. B. Srinivas
VTC
2008
IEEE
15 years 8 months ago
Resource Allocation and Control Signaling in the WINNER Flexible MAC Concept
—The EU WINNER projects have studied OFDM-based packet data systems beyond 3G that use adaptivity on all timescales to obtain high flexibility and performance. The adaptive trans...
Mikael Sternad, Tommy Svensson, Martin Döttli...
ACNS
2008
Springer
143views Cryptology» more  ACNS 2008»
15 years 7 months ago
On the Security of the CCM Encryption Mode and of a Slight Variant
In this paper, we present an analysis of the CCM mode of operations and of a slight variant. CCM is a simple and efficient encryption scheme which combines a CBC-MAC authentication...
Pierre-Alain Fouque, Gwenaëlle Martinet, Fr&e...
AH
2008
Springer
15 years 7 months ago
Analysing High-Level Help-Seeking Behaviour in ITSs
Abstract. In this paper, we look at initial results of data mining students’ help-seeking behaviour in two ITSs: SQL-Tutor and EER-Tutor. We categorised help given by these tutor...
Moffat Mathews, Tanja Mitrovic, David Thomson
CLUSTER
2007
IEEE
15 years 7 months ago
Anomaly localization in large-scale clusters
— A critical problem facing by managing large-scale clusters is to identify the location of problems in a system in case of unusual events. As the scale of high performance compu...
Ziming Zheng, Yawei Li, Zhiling Lan
« Prev « First page 1950 / 2037 Last » Next »