Sciweavers

6181 search results - page 1110 / 1237
» Predictive Matrix-Variate t Models
Sort
View
WISTP
2007
Springer
15 years 9 months ago
A New Resilient Key Management Protocol for Wireless Sensor Networks
Wireless Sensor Networks (WSN) security is an important issue which has been investigated by researchers for few years. The most fundamental security problem in WSN is key manageme...
Chakib Bekara, Maryline Laurent-Maknavicius
ANSS
2006
IEEE
15 years 9 months ago
Moderating Simulation Lag in Haptic Virtual Environments
Simulation lag is a known issue in networked virtual environments where users are geographically distributed. When users collaborate across the network using haptics, there are al...
Azzedine Boukerche, Shervin Shirmohammadi, Abuhoss...
105
Voted
DATE
2006
IEEE
99views Hardware» more  DATE 2006»
15 years 9 months ago
Parallel co-simulation using virtual synchronization with redundant host execution
In traditional parallel co-simulation approaches, the simulation speed is heavily limited by time synchronization overhead between simulators and idle time caused by data dependen...
Dohyung Kim, Soonhoi Ha, Rajesh Gupta
129
Voted
DSN
2006
IEEE
15 years 9 months ago
Assessment of the Effect of Memory Page Retirement on System RAS Against Hardware Faults
The Solaris 10 Operating System includes a number of new features for predictive self-healing. One such feature is the ability of the Fault Management software to diagnose memory ...
Dong Tang, Peter Carruthers, Zuheir Totari, Michae...
IAT
2006
IEEE
15 years 9 months ago
Crime Pattern Detection Using Data Mining
Data mining can be used to model crime detection problems. Crimes are a social nuisance and cost our society dearly in several ways. Any research that can help in solving crimes f...
Shyam Varan Nath
« Prev « First page 1110 / 1237 Last » Next »