Sciweavers

1102 search results - page 65 / 221
» Interference and Communications among Active Network Applica...
Sort
View
92
Voted
HICSS
2006
IEEE
115views Biometrics» more  HICSS 2006»
15 years 6 months ago
ACLE: A Communication Environment for Asynchronous Collaborative Learning
The popularity of distributed learning and the continued growth in the number of colleges and universities offering courses delivered entirely via asynchronous learning networks (...
Timothy J. Ellis, William Hafner
94
Voted
INFOCOM
2000
IEEE
15 years 5 months ago
Transport and Application Protocol Scrubbing
— This paper describes the design and implementation of a protocol scrubber, a transparent interposition mechanism for explicitly removing network attacks at both the transport a...
G. Robert Malan, David Watson, Farnam Jahanian, Pa...
142
Voted
INFOCOM
2012
IEEE
13 years 3 months ago
Sherlock is around: Detecting network failures with local evidence fusion
—Traditional approaches for wireless sensor network diagnosis are mainly sink-based. They actively collect global evidences from sensor nodes to the sink so as to conduct central...
Qiang Ma, Kebin Liu, Xin Miao, Yunhao Liu
APSEC
2001
IEEE
15 years 4 months ago
Orchestrating Computations on the World-Wide Web
Word processing software, email, and spreadsheet have revolutionized office activities. There are many other office tasks that are amenable to automation, such as: scheduling a vi...
Jayadev Misra, Harrick M. Vin
102
Voted
ICPPW
2006
IEEE
15 years 6 months ago
m-LPN: An Approach Towards a Dependable Trust Model for Pervasive Computing Applications
Trust, the fundamental basis of ‘cooperation’ – one of the most important characteristics for the performance of pervasive ad hoc network-- is under serious threat with the ...
Munirul M. Haque, Sheikh Iqbal Ahamed