Sciweavers

5234 search results - page 1012 / 1047
» Simulation of Computer Network Attacks
Sort
View
IJWMC
2010
103views more  IJWMC 2010»
15 years 5 days ago
Programmable agents for efficient topology formation of Bluetooth scatternets
The past few years have seen a burst in public interest and widespread use of portable electronic devices featuring both mature and emerging technologies for wireless communication...
Sergio González-Valenzuela, Son T. Vuong, V...
CORR
2010
Springer
142views Education» more  CORR 2010»
14 years 10 months ago
On the Benefit of Virtualization: Strategies for Flexible Server Allocation
Abstract--Virtualization technology facilitates a dynamic, demanddriven allocation and migration of servers. This paper studies how the flexibility offered by network virtualizatio...
Dushyant Arora, Anja Feldmann, Gregor Schaffrath, ...
ICASSP
2010
IEEE
14 years 9 months ago
Performance of shockwave-based shooter localization under model misspecification
This paper considers the estimation of shooter locations using a sensor network where each sensor measures the time difference between receptions of a firearm's muzzle blast ...
Joshua N. Ash, Gene T. Whipps, Richard J. Kozick
TON
2010
188views more  TON 2010»
14 years 9 months ago
Self-Chord: A Bio-Inspired P2P Framework for Self-Organizing Distributed Systems
This paper presents "Self-Chord," a peer-to-peer (P2P) system that inherits the ability of Chord-like structured systems for the construction and maintenance of an overla...
Agostino Forestiero, Emilio Leonardi, Carlo Mastro...
TSMC
2010
14 years 9 months ago
Efficient Sensor Selection for Active Information Fusion
In our previous paper [1], we formalized an active information fusion framework based on dynamic Bayesian networks to provide active information fusion. This paper focuses on a ce...
Yongmian Zhang, Qiang Ji
« Prev « First page 1012 / 1047 Last » Next »