Sciweavers

4744 search results - page 224 / 949
» Connected Computing
Sort
View
119
Voted
APNOMS
2006
Springer
15 years 7 months ago
Autonomic Management of Scalable Load-Balancing for Ubiquitous Networks
In ubiquitous networks, a lot of sensors and RFID readers will be connected to the networks as well as PCs and mobile phones are connected, and huge numbers of transactions are exp...
Toshio Tonouchi, Yasuyuki Beppu
119
Voted
CW
2004
IEEE
15 years 7 months ago
Watermarking a 3D Shape Model Defined as a Point Set
This paper discusses a method to watermark a 3D shape model defined as a set of unoriented points. Our approach is to perform frequency domain analysis of the shape of the 3D poin...
Ryutarou Ohbuchi, Akio Mukaiyama, Shigeo Takahashi
DSN
2004
IEEE
15 years 7 months ago
HOURS: Achieving DoS Resilience in an Open Service Hierarchy
Hierarchical systems have been widely used to provide scalable distributed services in the Internet. Unfortunately, such a service hierarchy is vulnerable to DoS attacks. This pap...
Hao Yang, Haiyun Luo, Yi Yang, Songwu Lu, Lixia Zh...
116
Voted
EXACT
2007
15 years 6 months ago
Designing Explanation Aware Systems: The Quest for Explanation Patterns
Systems in general, and intelligent systems in particular, need to be able to explain their behaviour to their users or partners. Previously, a number of different user goals that...
Jörg Cassens, Anders Kofod-Petersen
149
Voted
AINA
2008
IEEE
15 years 5 months ago
Monitoring Network Traffic to Detect Stepping-Stone Intrusion
Most network intruders tend to use stepping-stones to attack or to invade other hosts to reduce the risks of being discovered. There have been many approaches that were proposed t...
Jianhua Yang, Byong Lee, Stephen S. H. Huang