Sciweavers

553 search results - page 102 / 111
» Perfect difference sets constructed from Sidon sets
Sort
View
PERCOM
2011
ACM
14 years 3 months ago
Mobile node rostering in intermittently connected passive RFID networks
— This paper focuses on the problem of rostering in intermittently connected passive RFID networks. It aims to report a list of tagged mobile nodes that appear in given intereste...
Zhipeng Yang, Hongyi Wu
IEEESCC
2007
IEEE
15 years 6 months ago
Exchanging Policies between Web Service Entities using Rule Languages
Web rule languages with the ability to cover various types of rules have been recently emerged to make interactions between web resources and broker agents possible. The chance of...
Nima Kaviani, Dragan Gasevic, Marek Hatala, Gerd W...
TRIDENTCOM
2006
IEEE
15 years 5 months ago
Emulation versus simulation: A case study of TCP-targeted denial of service attacks
—In this paper, we investigate the applicability of simulation and emulation for denial of service (DoS) attack experimentation. As a case study, we consider low-rate TCP-targete...
Roman Chertov, Sonia Fahmy, Ness B. Shroff
DASFAA
2005
IEEE
256views Database» more  DASFAA 2005»
15 years 5 months ago
CoCache: Query Processing Based on Collaborative Caching in P2P Systems
Peer-to-peer (P2P) computing is gaining more and more significance due to its widespread use currently and potential deployments in future applications. In this paper, we propose ...
Weining Qian, Linhao Xu, Shuigeng Zhou, Aoying Zho...
HICSS
2003
IEEE
101views Biometrics» more  HICSS 2003»
15 years 5 months ago
Omnisphere: a Personal Communication Environment
Small ubiquitous devices connected by wireless networks will become future Internet appliances. To support them, communication networks must evolve to seamlessly assist appliances...
Franck Rousseau, Justinian Oprescu, Laurentiu-Sori...