Sciweavers

5234 search results - page 894 / 1047
» Simulation of Computer Network Attacks
Sort
View
117
Voted
ICN
2009
Springer
15 years 8 months ago
Trainspotting, a WSN-Based Train Integrity System
In contrast to classic train protection systems where most of the safety measures are built into the rail infrastructure, future versions of the European railway safety system ERT...
Hans Scholten, Roel Westenberg, Manfred Schoemaker
162
Voted
ICMCS
1997
IEEE
142views Multimedia» more  ICMCS 1997»
15 years 8 months ago
A Rate Allocation Policy with MCR/PCR Support and Distributed ABR Implementation Using Explicit Rate Feedback
An important concept in the available bit rate (ABR) service model as defined by the ATM Forum is the minimum cell rate (MCR) guarantee as well as the peak cell rate (PCR) constra...
Yiwei Thomas Hou, Henry H.-Y. Tzeng, Shivendra S. ...
117
Voted
ATAL
2008
Springer
15 years 5 months ago
Max-sum decentralised coordination for sensor systems
A key challenge for the successful deployment of systems consisting of multiple autonomous networked sensors is the development of decentralised mechanisms to coordinate the activ...
W. T. Luke Teacy, Alessandro Farinelli, N. J. Grab...
153
Voted
IPSN
2010
Springer
15 years 5 months ago
Information processing for live photo mosaic with a group of wireless image sensors
Photo tourism [11] is a platform that allows users to transform unstructured online digital photos into a 3D experience. Nowadays, image sensors are being extensively used to allo...
Fulu Li, James Barabas, Ana L. Santos
160
Voted
NETWORKING
2007
15 years 5 months ago
Construction of a Proxy-Based Overlay Skeleton Tree for Large-Scale Real-Time Group Communications
Abstract. We consider the problem of constructing a proxy-based overlay skeleton tree (POST) in the backbone service domain of a two-tier overlay multicast infrastructure. Spanning...
Jun Guo, Sanjay Jha