Sciweavers

1266 search results - page 46 / 254
» Threat Evaluation Method for Distributed Network Environment
Sort
View
IPSN
2003
Springer
15 years 5 months ago
Hypothesis Testing over Factorizations for Data Association
Abstract. The issue of data association arises frequently in sensor networks; whenever multiple sensors and sources are present, it may be necessary to determine which observations...
Alexander T. Ihler, John W. Fisher III, Alan S. Wi...
IADIS
2003
15 years 1 months ago
A Real-Time Analysis Method of Students' Behavior for a Supporting System of a Distance Lecture
Distance Education Course (DEC) has been becoming more and more popular in many universities with the fast development of the Internet technology. The communication between the te...
Akira Suganuma
ICC
2007
IEEE
108views Communications» more  ICC 2007»
15 years 6 months ago
Trust Establishment in Distributed Networks: Analysis and Modeling
— Recently, trust establishment is recognized as an important approach to defend distributed networks, such as mobile ad hoc networks and sensor networks, against malicious attac...
Yan Lindsay Sun, Yafei Yang
AINA
2005
IEEE
15 years 5 months ago
Implementation and Evaluation of a Java Based Computational Grid for Bioinformatics Applications
In the present study, THUBioGrid, an experimental distributed computing application for bioinformatics (BioGrid) is proposed. THUBioGrid incorporates directory services (data and ...
Chao-Tung Yang, Yi-Chun Hsiung, Heng-Chuan Kan
SOQUA
2004
15 years 1 months ago
Measuring Component Performance Using A Systematic Approach and Environment
: As more third-party software components are available in the commercial market, more people begin to use the component-based software engineering approach to developing component...
Jerry Gao, Chandra S. Ravi, Raquel Espinoza