Sciweavers

559 search results - page 59 / 112
» Constraint-Based Deployment of Distributed Components in a D...
Sort
View
102
Voted
PERCOM
2005
ACM
15 years 6 months ago
Applying Active Space Principles to Active Classrooms
Recent developments in pervasive computing have enabled new features for collaboration and instrumentation in educational technology systems. An infrastructure for the integration...
Chad Peiper, David Warden, Ellick Chan, Roy H. Cam...
HICSS
2009
IEEE
209views Biometrics» more  HICSS 2009»
15 years 7 months ago
SIDD: A Framework for Detecting Sensitive Data Exfiltration by an Insider Attack
Detecting and mitigating insider threat is a critical element in the overall information protection strategy. By successfully implementing tactics to detect this threat, organizat...
Yali Liu, Cherita L. Corbett, Ken Chiang, Rennie A...
132
Voted
ICOIN
2003
Springer
15 years 5 months ago
A Bluetooth Scatternet Formation Algorithm for Networks with Heterogeneous Device Capabilities
This paper focuses on Bluetooth, a promising new wireless technology, developed mainly as a cable replacement. We argue that, in practice, Bluetooth devices will have different po...
Dimitri Reading-Picopoulos, Alhussein A. Abouzeid
118
Voted
TON
2002
125views more  TON 2002»
15 years 5 days ago
Multicast-based inference of network-internal delay distributions
Packet delay greatly influences the overall performance of network applications. It is therefore important to identify causes and location of delay performance degradation within ...
Francesco Lo Presti, Nick G. Duffield, Joseph Horo...
91
Voted
MOBISYS
2003
ACM
16 years 4 days ago
Characterizing Mobility and Network Usage in a Corporate Wireless Local-Area Network
Wireless local-area networks are becoming increasingly popular. They are commonplace on university campuses and inside corporations, and they have started to appear in public area...
Magdalena Balazinska, Paul Castro