Sciweavers

400 search results - page 64 / 80
» Simulation within the railroad environment
Sort
View
ASPLOS
2004
ACM
15 years 3 months ago
Deconstructing storage arrays
We introduce Shear, a user-level software tool that characterizes RAID storage arrays. Shear employs a set of controlled algorithms combined with statistical techniques to automat...
Timothy E. Denehy, John Bent, Florentina I. Popovi...
AH
2004
Springer
15 years 3 months ago
The Personal Reader: Personalizing and Enriching Learning Resources Using Semantic Web Technologies.
Traditional adaptive hypermedia systems have focused on providing adaptation functionality on a closed corpus, while Web search interfaces have delivered non-personalized informati...
Peter Dolog, Nicola Henze, Wolfgang Nejdl, Michael...
FSE
2004
Springer
90views Cryptology» more  FSE 2004»
15 years 3 months ago
Fast Software-Based Attacks on SecurID
SecurID is a widely used hardware token for strengthening authentication in a corporate environment. Recently, Biryukov, Lano, and Preneel presented an attack on the alleged SecurI...
Scott Contini, Yiqun Lisa Yin
ISCC
2003
IEEE
140views Communications» more  ISCC 2003»
15 years 3 months ago
A Low-Energy Key Management Protocol for Wireless Sensor Networks
Sensor networks have recently gained popularity for a wide spectrum of applications. When performing monitoring tasks in hostile environments, security requirements become critical...
Gaurav Jolly, Mustafa C. Kusçu, Pallavi Kok...
SENSYS
2003
ACM
15 years 3 months ago
Cooperative tracking with binary-detection sensor networks
We present a novel method for tracking the movement of people or vehicles in open outdoor environments using sensor networks. Unlike other sensor network-based methods, which depe...
Kirill Mechitov, Sameer Sundresh, YoungMin Kwon, G...