Sciweavers

807 search results - page 87 / 162
» Deploying and evaluating a location-aware system
Sort
View
ITCC
2002
IEEE
15 years 2 months ago
Performance of Multimedia Applications with IPSec Tunneling
The concept of Virtual Private Networks offers a simple and cheap alternative to dedicated secure networks in corporate networks and Internet environments. The choice, however, of...
Samir Al-Khayatt, Siraj A. Shaikh, Babak Akhgar, J...
ICASSP
2011
IEEE
14 years 1 months ago
Network-MIMO backhauling for QOS-constrained relay transmission
1 A relay station (RS)-based cellular system deployment is considered, where multiple base stations (BS) cooperate in the BSRS in-band transmission for the downlink. With the joint...
Josep Vidal, Adrian Agustin, Sandra Lagen, Eduard ...
ICDE
2002
IEEE
149views Database» more  ICDE 2002»
15 years 11 months ago
GADT: A Probability Space ADT for Representing and Querying the Physical World
Large sensor networks are being widely deployed for measurement, detection, and monitoring applications. Many of these applications involve database systems to store and process d...
Anton Faradjian, Johannes Gehrke, Philippe Bonnet
ICCBR
2009
Springer
15 years 4 months ago
A Case-Based Perspective on Social Web Search
Web search is the main way for millions of users to access information every day, but we continue to struggle when it comes to finding the right information at the right time. In ...
Barry Smyth, Peter Briggs, Maurice Coyle, Michael ...
IPOM
2009
Springer
15 years 4 months ago
A Labeled Data Set for Flow-Based Intrusion Detection
Abstract. Flow-based intrusion detection has recently become a promising security mechanism in high speed networks (1-10 Gbps). Despite the richness in contributions in this field...
Anna Sperotto, Ramin Sadre, Frank van Vliet, Aiko ...