Sciweavers

4543 search results - page 238 / 909
» Interactive Distributed Configuration
Sort
View
WORDS
2002
IEEE
15 years 8 months ago
Jini Meets Embedded Control Networking: A Case Study in Portability Failure
The Robust Self-Configuring Embedded Systems (RoSES) project seeks to achieve graceful degradation through software reconfiguration. To accomplish this goal, systems must automati...
Meredith Beveridge, Philip Koopman
135
Voted
CSC
2006
15 years 4 months ago
An Adaptive Method for Flow Simulation in Three-Dimensional Heterogeneous Discrete Fracture Networks
Natural fractured media are highly unpredictable because of existing complex structures at the fracture and at the network levels. Fractures are by themselves heterogeneous objects...
Hussein Mustapha
106
Voted
WSC
1998
15 years 4 months ago
Sequential Allocations that Reduce Risk for Multiple Comparisons
We consider how to efficiently allocate computing resources in order to infer the best of a finite set of simulated systems, where best means that the system has the maximal expec...
Stephen E. Chick, Koichiro Inoue
141
Voted
CORR
2006
Springer
189views Education» more  CORR 2006»
15 years 3 months ago
Node-Based Optimal Power Control, Routing, and Congestion Control in Wireless Networks
Abstract--In wireless networks, important network functionalities such as power control, rate allocation, routing, and congestion control must be optimized in a coherent and integr...
Yufang Xi, Edmund M. Yeh
147
Voted
JSAC
2006
137views more  JSAC 2006»
15 years 3 months ago
Adaptive Defense Against Various Network Attacks
In defending against various network attacks, such as distributed denial-of-service (DDoS) attacks or worm attacks, a defense system needs to deal with various network conditions a...
Cliff Changchun Zou, Nick G. Duffield, Donald F. T...