Sciweavers

820 search results - page 102 / 164
» Techniques for Efficient Interactive Configuration of Distri...
Sort
View
CCS
2006
ACM
15 years 3 months ago
A scalable approach to attack graph generation
Attack graphs are important tools for analyzing security vulnerabilities in enterprise networks. Previous work on attack graphs has not provided an account of the scalability of t...
Xinming Ou, Wayne F. Boyer, Miles A. McQueen
IC
2004
15 years 1 months ago
An Internet-Wide Distributed System for Data-Stream Processing
The ubiquity of the Internet has stimulated the development of data- rather than processor-intensive applications. Such data-intensive applications include streaming media, intera...
Gabriel Parmer, Richard West, Xin Qi, Gerald Fry, ...
VLSID
2005
IEEE
285views VLSI» more  VLSID 2005»
16 years 6 days ago
Power Monitors: A Framework for System-Level Power Estimation Using Heterogeneous Power Models
Abstract--Power analysis early in the design cycle is critical for the design of lowpower systems. With the move to system-level specifications and design methodologies, there has ...
Nikhil Bansal, Kanishka Lahiri, Anand Raghunathan,...
MOBIHOC
2004
ACM
15 years 11 months ago
Rate allocation in wireless sensor networks with network lifetime requirement
An important performance consideration for wireless sensor networks is the amount of information collected by all the nodes in the network over the course of network lifetime. Sin...
Yiwei Thomas Hou, Yi Shi, Hanif D. Sherali
COMCOM
2008
83views more  COMCOM 2008»
14 years 12 months ago
Hierarchical multidimensional search in peer-to-peer networks
We propose a P2P search solution, called EZSearch, that enables efficient multidimensional search for remotely located contents that best match the search criteria. EZSearch is a h...
Duc A. Tran, T. Nguyen