Sciweavers

5615 search results - page 1011 / 1123
» On the Computational Capabilities of Several Models
Sort
View
PIMRC
2008
IEEE
15 years 4 months ago
Increasing SIP firewall performance by ruleset size limitation
Abstract— To protect SIP communication networks from attacks, especially flooding attacks like Denial-of-Service or message spam, Intrusion Detection Systems (IDS) are deployed ...
Sven Ehlert, Ge Zhang, Thomas Magedanz
GLOBECOM
2007
IEEE
15 years 4 months ago
Clustered K-Center: Effective Replica Placement in Peer-to-Peer Systems
Abstract— Peer-to-Peer (P2P) systems provide decentralization, self-organization, scalability and failure-resilience, but suffer from high worst-case latencies. Researchers have ...
Jian Zhou, Xin Zhang, Laxmi N. Bhuyan, Bin Liu
ICC
2007
IEEE
160views Communications» more  ICC 2007»
15 years 4 months ago
Efficient Coverage Planning for Grid-Based Wireless Sensor Networks
- In this paper we study efficient triangular grid-based sensor deployment planning for coverage when sensor placements are perturbed by random errors around their corresponding gr...
Glen Takahara, Kenan Xu, Hossam S. Hassanein
ICPADS
2007
IEEE
15 years 4 months ago
Optimization on distributed user management in Wireless Sensor Networks
In this paper, we address one of the Wireless Sensor Network (WSN) management problems – optimization on the execution of multiple commands. The objective of the paper is to pro...
MingJian Tang, Jinli Cao
ISBI
2007
IEEE
15 years 4 months ago
A Novel Tag Removal Technique for Tagged Cardiac Mri and Its Applications
In this paper we present a novel tag removal method for tagged cardiac MR images. This method is based on a 2D bandstop filtering technique, which selectively attenuates the tag ...
Zhen Qian, Rui Huang, Dimitris N. Metaxas, Leon Ax...
« Prev « First page 1011 / 1123 Last » Next »