Sciweavers

8086 search results - page 1549 / 1618
» On the Implementation of Dynamic Patterns
Sort
View
144
Voted
INFOCOM
2006
IEEE
15 years 9 months ago
Backbone Topology Synthesis for Multi-Radio Meshed Wireless LANs
—Wireless local area network (WLAN) systems are widely implemented today to provide hot spot coverage. Operated typically in an infrastructure mode, each WLAN is managed by an ac...
Laura Huei-jiun Ju, Izhak Rubin
123
Voted
INFOCOM
2006
IEEE
15 years 9 months ago
Intelligent Distribution of Intrusion Prevention Services on Programmable Routers
— The recent surge of new viruses and host attacks in the Internet and the tremendous propagation speed of selfdistributing attacks has made network security a pressing issue. To...
Andreas Hess, Hans-Florian Geerdes, Roland Wess&au...
ISM
2006
IEEE
81views Multimedia» more  ISM 2006»
15 years 9 months ago
Water Jets as Pixels: Water Fountains as Both Sensors and Displays
We propose a hydraulic user interface consisting of an array of spray jets and the appropriate fluid sensing and fluid flow control systems for each jet, so that the device fun...
Steve Mann, Michael Georgas, Ryan E. Janzen
133
Voted
RTCSA
2006
IEEE
15 years 9 months ago
Data Freshness and Overload Handling in Embedded Systems
In this paper we consider data freshness and overload handling in embedded systems. The requirements on data management and overload handling are derived from an engine control so...
Thomas Gustafsson, Jörgen Hansson
SECPERU
2006
IEEE
15 years 9 months ago
Detecting Critical Nodes for MANET Intrusion Detection Systems
Ad hoc routing protocols have been designed to efficiently reroute traffic when confronted with network congestion, faulty nodes, and dynamically changing topologies. The common d...
A. Karygiannis, E. Antonakakis, A. Apostolopoulos
« Prev « First page 1549 / 1618 Last » Next »