Sciweavers

16128 search results - page 2832 / 3226
» Distributed network scheduling
Sort
View
OPODIS
2004
15 years 5 months ago
Secure Location Verification Using Radio Broadcast
Secure location verification is a recently stated problem that has a number of practical applications. The problem requires a wireless sensor network to confirm that a potentially...
Adnan Vora, Mikhail Nesterenko
UAI
2001
15 years 5 months ago
A Bayesian Multiresolution Independence Test for Continuous Variables
In this paper we present a method of computing the posterior probability of conditional independence of two or more continuous variables from data, examined at several resolutions...
Dimitris Margaritis, Sebastian Thrun
USITS
2001
15 years 5 months ago
Nettimer: A Tool for Measuring Bottleneck Link Bandwidth
Measuring the bottleneck link bandwidth along a path is important for understanding the performance of many Internet applications. Existing tools to measure bottleneck bandwidth a...
Kevin Lai, Mary Baker
WSC
2004
15 years 5 months ago
Evaluation of Secure Peer-to-Peer Overlay Routing for Survivable SCADA Systems
Supervisory Control And Data Acquisition (SCADA) systems gather and analyze data for real-time control. SCADA systems are used extensively, in applications such as electrical powe...
Jeffrey J. Farris, David M. Nicol
MMNS
2003
135views Multimedia» more  MMNS 2003»
15 years 5 months ago
Pervasive Accounting of Resource Consumption for Wireless Services with Adaptive QoS
Wireless communications and device miniaturization are enabling pervasive scenarios where the limited resource availability and the wide heterogeneity of access terminals make cruc...
Paolo Bellavista, Antonio Corradi, Silvia Vecchi
« Prev « First page 2832 / 3226 Last » Next »