Sciweavers

8493 search results - page 140 / 1699
» Implementing a distributed firewall
Sort
View
139
Voted
COMCOM
2008
91views more  COMCOM 2008»
15 years 3 months ago
A WEP post-processing algorithm for a Robust 802.11 WLAN implementation
Wired Equivalent Privacy (WEP) protocol used within the IEEE 802.11 standard has "major security flaws" thus wireless local area networks (WLANs) using the protocol are ...
Taskin Koçak, Mohit Jagetia
JSW
2006
98views more  JSW 2006»
15 years 3 months ago
A Jxta Based Asynchronous Peer-to-Peer Implementation of Genetic Programming
Abstract-- Solving complex real-world problems using evolutionary computation is a CPU time-consuming task that requires a large amount of computational resources. Peerto-Peer (P2P...
Gianluigi Folino, Agostino Forestiero, Giandomenic...
WDAG
2010
Springer
230views Algorithms» more  WDAG 2010»
15 years 1 months ago
Implementing Fault-Tolerant Services Using State Machines: Beyond Replication
Abstract—This paper describes a method to implement faulttolerant services in distributed systems based on the idea of fused state machines. The theory of fused state machines us...
Vijay K. Garg
147
Voted
CVPR
2007
IEEE
16 years 5 months ago
Topology Preserving Log-Unbiased Nonlinear Image Registration: Theory and Implementation
In this paper, we present a novel framework for constructing large deformation log-unbiased image registration models that generate theoretically and intuitively correct deformati...
Igor Yanovsky, Paul M. Thompson, Stanley Osher, Al...
124
Voted
ICDCSW
2008
IEEE
15 years 9 months ago
Design and Implementation of a WSN-Based Intelligent Light Control System
—Recently, wireless sensor networks (WSNs) have been widely discussed in many applications. In this paper, we propose a WSN-based intelligent light control system for indoor envi...
Meng-Shiuan Pan, Lun-Wu Yeh, Yen-Ann Chen, Yu-Hsua...