Sciweavers

1583 search results - page 119 / 317
» The Quorum Deployment Problem
Sort
View
120
Voted
IPCCC
2006
IEEE
15 years 9 months ago
Towards a framework for worm-defense evaluation
Computer worms are a serious problem. Much research has been done to detect and contain worms. One major deficiency in most research is that the claims are supported by theoretic...
Senthilkumar G. Cheetancheri, Denys L. Ma, Karl N....
133
Voted
SUTC
2006
IEEE
15 years 9 months ago
An Indoor Localization Mechanism Using Active RFID Tag
The location-aware technology and its application are prerequisite to realize the ubiquitous computing. However, another special system for indoor localization is needed in the co...
Guang-yao Jin, Xiao-Yi Lu, Myong-Soon Park
128
Voted
VTC
2006
IEEE
15 years 9 months ago
SNMP-Based Approach to Load Distribution in IEEE 802.11 Networks
Abstract— In an IEEE 802.11 network, the traffic load collectively given by wireless stations (WSs) is usually not fairly shared by all available access points (APs), as WSs ind...
Li-Hsing Yen, Tse-Tsung Yeh
141
Voted
WIOPT
2006
IEEE
15 years 9 months ago
Optimizing data replication for expanding ring-based queries in wireless sensor networks
We consider the problem of optimizing the number of replicas for event information in wireless sensor networks, when queries are disseminated using expanding rings. We obtain clos...
Bhaskar Krishnamachari, Joon Ahn
ACSAC
2005
IEEE
15 years 9 months ago
Dynamic Taint Propagation for Java
Improperly validated user input is the underlying root cause for a wide variety of attacks on web-based applications. Static approaches for detecting this problem help at the time...
Vivek Haldar, Deepak Chandra, Michael Franz