Sciweavers

5234 search results - page 872 / 1047
» Simulation of Computer Network Attacks
Sort
View
DCC
2008
IEEE
16 years 3 months ago
Dimension Reduction and Expansion: Distributed Source Coding in a Noisy Environment
We studied the problem of distributed coding and transmission of intercorrelated sources with memory. Different from the conventional distributed source coding structure which rel...
Anna N. Kim, Fredrik Hekland
IPPS
2009
IEEE
15 years 10 months ago
Robust CDN replica placement techniques
—Creating replicas of frequently accessed data objects across a read-intensive Content Delivery Network (CDN) can result in reduced user response time. Because CDNs often operate...
Samee Ullah Khan, Anthony A. Maciejewski, Howard J...
DCOSS
2009
Springer
15 years 10 months ago
Speed Dating Despite Jammers
Many wireless standards and protocols today, such as WLAN and Bluetooth, operate on similar frequency bands. While this permits an efficient usage of the limited medium capacity, ...
Dominic Meier, Yvonne Anne Pignolet, Stefan Schmid...
DEXA
2009
Springer
201views Database» more  DEXA 2009»
15 years 10 months ago
Dynamic Query Processing for P2P Data Services in the Cloud
With the trend of cloud computing, data and computing are moved away from desktop and are instead provided as a service from the cloud. Data-as-a-service enables access to a wealth...
Pawel Jurczyk, Li Xiong
CDC
2008
IEEE
163views Control Systems» more  CDC 2008»
15 years 10 months ago
A cooperative deployment strategy for optimal sampling in spatiotemporal estimation
— This paper considers a network composed of robotic agents and static nodes performing spatial estimation of a dynamic physical processes. The physical process is modeled as a s...
Rishi Graham, Jorge Cortés