Sciweavers

7426 search results - page 1312 / 1486
» The LHC Computing Challenge
Sort
View
171
Voted
SASN
2003
ACM
15 years 10 months ago
Admission control in Peer-to-Peer: design and performance evaluation
Peer-to-Peer (P2P) applications and services are very common in today’s computing. The popularity of the P2P paradigm prompts the need for specialized security services which ma...
Nitesh Saxena, Gene Tsudik, Jeong Hyun Yi
WSNA
2003
ACM
15 years 10 months ago
Analysis on the redundancy of wireless sensor networks
Wireless sensor networks consist of a large number of tiny sensors that have only limited energy supply. One of the major challenges in constructing such networks is to maintain l...
Yong Gao, Kui Wu, Fulu Li
DSVIS
2003
Springer
15 years 10 months ago
An Approach to Develop User Interfaces with Plasticity
This paper provides an approach to develop user interfaces where plasticity is considered by using several concepts, concretely our proposal is a pattern-based, component-oriented ...
Francisco Montero, Víctor López-Jaqu...
GI
2003
Springer
15 years 10 months ago
Strategic Simulation Games to foster Policy Development for Critical Infrastructure Protection
: Strategic Simulation Games have become an important element of policy development in the context of Critical Infrastructure Protection (CIP). They foster the network between all ...
Matthias Holenstein, Daniel Bircher
154
Voted
IPSN
2003
Springer
15 years 10 months ago
Acoustic Target Tracking Using Tiny Wireless Sensor Devices
With the advancement of MEMS technologies, wireless networks consist of tiny sensor devices hold the promise of revolutionizing sensing in a wide range of application domains becau...
Qixin Wang, Wei-Peng Chen, Rong Zheng, Kihwal Lee,...
« Prev « First page 1312 / 1486 Last » Next »