Sciweavers

502 search results - page 74 / 101
» Deploying a New Hash Algorithm
Sort
View
INFOCOM
2010
IEEE
14 years 9 months ago
Path Stitching: Internet-Wide Path and Delay Estimation from Existing Measurements
Many measurement systems have been proposed in recent years to shed light on the internal performance of the Internet. Their common goal is to allow distributed applications to imp...
D. K. Lee, Keon Jang, Changhyun Lee, Gianluca Iann...
TIP
2010
145views more  TIP 2010»
14 years 6 months ago
Joint Manifolds for Data Fusion
The emergence of low-cost sensing architectures for diverse modalities has made it possible to deploy sensor networks that capture a single event from a large number of vantage po...
Mark A. Davenport, Chinmay Hegde, Marco F. Duarte,...
CIDR
2011
274views Algorithms» more  CIDR 2011»
14 years 3 months ago
Cloud Resource Orchestration: A Data-Centric Approach
Cloud computing provides users near instant access to seemingly unlimited resources, and provides service providers the opportunity to deploy complex information technology infras...
Yun Mao, Changbin Liu, Jacobus E. van der Merwe, M...
PERVASIVE
2011
Springer
14 years 2 months ago
Disaggregated End-Use Energy Sensing for the Smart Grid
Most utility installed energy meters are primarily intended to support a utility's billing function. They report only the aggregate energy consumption of a home or business o...
Jon Froehlich, Eric Larson, Sidhant Gupta, Gabe Co...
INFOCOM
2012
IEEE
13 years 2 months ago
Strategizing surveillance for resource-constrained event monitoring
—Surveillance systems, such as sensor networks and surveillance camera networks, have been widely deployed to monitor events in many different scenarios. One common way to conser...
Xi Fang, Dejun Yang, Guoliang Xue