Sciweavers

12562 search results - page 2352 / 2513
» Distributed Xbean Applications
Sort
View
73
Voted
GLOBECOM
2009
IEEE
15 years 2 months ago
Experimental Validation of Periodic Codes for PON Monitoring
In this paper we investigate both experimentally and via simulation the monitoring of fiber link quality in a PON using optical coding technology. We use a new, simple and costeffe...
Mohammad M. Rad, Habib Fathallah, Sophie LaRochell...
GLOBECOM
2009
IEEE
15 years 2 months ago
Route Capacity Estimation Based Admission Control and QoS Routing for Mesh Networks
Wireless Mesh Networks (WMNs) is a promising key technology for next generation wireless backhauling that is expected to support various types of applications with different qualit...
Chi Harold Liu, Athanasios Gkelias, Kin K. Leung
ACCV
2006
Springer
15 years 1 months ago
Complex Activity Representation and Recognition by Extended Stochastic Grammar
Stochastic grammar has been used in many video analysis and event recognition applications as an efficient model to represent large-scale video activity. However, in previous works...
Zhang Zhang, Kaiqi Huang, Tieniu Tan
ACSAC
2004
IEEE
15 years 1 months ago
Visualizing Enterprise-Wide Security (VIEWS)
This paper discusses VIEWS, a specification for building diagrams that describe the security features of systems. The authors' recent experience with providing security archi...
J. J. Brennan, Mindy Rudell, Donald B. Faatz, Cars...
83
Voted
ACSAC
2004
IEEE
15 years 1 months ago
Vulnerabilities and Security Threats in Structured Overlay Networks: A Quantitative Analysis
1 A number of recent applications have been built on distributed hash tables (DHTs) based overlay networks. Almost all DHT-based schemes employ a tight deterministic data placement...
Mudhakar Srivatsa, Ling Liu
« Prev « First page 2352 / 2513 Last » Next »