Sciweavers

394 search results - page 78 / 79
» The wireless control network: Monitoring for malicious behav...
Sort
View
ICASSP
2011
IEEE
12 years 10 months ago
Modeling nodal prices in deregulated electricity markets in the usa: current practices and future needs
The purpose of this paper is to model the stochastic behavior of the nodal prices of electricity in deregulated markets in the USA, and in particular, to explain how this behavior...
Timothy D. Mount
WISEC
2010
ACM
13 years 11 months ago
Privacy-preserving computation of benchmarks on item-level data using RFID
Currently, companies are about to optimize their internal processes by monitoring items they handle with Radio Frequency Identification (RFID). However, there is a risk that sens...
Florian Kerschbaum, Nina Oertel, Leonardo Weiss Fe...
DSONLINE
2006
108views more  DSONLINE 2006»
13 years 6 months ago
Middleware for Protocol-Based Coordination in Mobile Applications
We propose extending these middleware approaches with suitable abstractions to better support protocolbased interaction in mobile applications. To test our approach, we created Obj...
Kurt Schelfthout, Danny Weyns, Tom Holvoet
SIGMETRICS
2008
ACM
142views Hardware» more  SIGMETRICS 2008»
13 years 6 months ago
Exploiting manufacturing variations for compensating environment-induced clock drift in time synchronization
Time synchronization is an essential service in distributed computing and control systems. It is used to enable tasks such as synchronized data sampling and accurate time-offlight...
Thomas Schmid, Zainul Charbiwala, Jonathan Friedma...
HASE
2007
IEEE
14 years 18 days ago
Scalable, Adaptive, Time-Bounded Node Failure Detection
This paper presents a scalable, adaptive and timebounded general approach to assure reliable, real-time Node-Failure Detection (NFD) for large-scale, high load networks comprised ...
Matthew Gillen, Kurt Rohloff, Prakash Manghwani, R...