Sciweavers

1425 search results - page 210 / 285
» Providing quality of service monitoring: challenges and appr...
Sort
View
CACM
2008
96views more  CACM 2008»
15 years 7 hour ago
The provenance of electronic data
In the study of fine art, provenance refers to the documented history of some art object. Given that documented history, the object attains an authority that allows scholars to ap...
Luc Moreau, Paul T. Groth, Simon Miles, Javier V&a...
106
Voted
ICC
2007
IEEE
179views Communications» more  ICC 2007»
15 years 6 months ago
Finite Queuing Model Analysis for Energy and QoS Tradeoff in Contention-Based Wireless Sensor Networks
In contention-based sensor networks, nodes compete to access a shared channel for data transmission and collision is a common challenge. For power conservation, periodical active/s...
Jun Luo, Ling-ge Jiang, Chen He
LCN
2005
IEEE
15 years 5 months ago
Filtering of Shrew DDoS Attacks in Frequency Domain
—The shrew Distributed Denial of Service (DDoS) attacks are periodic, bursty, and stealthy in nature. They are also known as Reduction of Quality (RoQ) attacks. Such attacks coul...
Yu Chen, Kai Hwang, Yu-Kwong Kwok
TON
2010
107views more  TON 2010»
14 years 6 months ago
Leveraging Dynamic Spare Capacity in Wireless Systems to Conserve Mobile Terminals' Energy
In this paper we study several ways in which mobile terminals can backoff on their uplink transmit power in order to extend battery lifetimes. This is particularly effective when a...
Hongseok Kim, Gustavo de Veciana
OSDI
2008
ACM
16 years 5 days ago
Predicting Computer System Failures Using Support Vector Machines
Mitigating the impact of computer failure is possible if accurate failure predictions are provided. Resources, applications, and services can be scheduled around predicted failure...
Errin W. Fulp, Glenn A. Fink, Jereme N. Haack