Sciweavers

4052 search results - page 110 / 811
» Using RDF to describe networks
Sort
View
104
Voted
ICIP
2008
IEEE
16 years 2 months ago
Layered wireless video multicast using directional relays
In this paper, we explore the use of directional antennas in relay transmission to improve the performance of video multicast with omni-directional relays in infrastructurebased wi...
Ozgu Alay, Thanasis Korakis, Yao Wang, Shivendra S...
130
Voted
IWIA
2006
IEEE
15 years 6 months ago
Modeling and Execution of Complex Attack Scenarios using Interval Timed Colored Petri Nets
The commonly used flaw hypothesis model (FHM) for performing penetration tests provides only limited, highlevel guidance for the derivation of actual penetration attempts. In thi...
Ole Martin Dahl, Stephen D. Wolthusen
103
Voted
CD
2005
Springer
15 years 6 months ago
Component Deployment Using a Peer-to-Peer Overlay
The deployment of component-based software applications usually relies on a centralized repository where the components are stored. This paper describes a peer-to-peer approach for...
Stéphane Frénot, Yvan Royon
107
Voted
TSMC
1998
132views more  TSMC 1998»
15 years 13 days ago
Decision support for vehicle dispatching using genetic programming
—Vehicle dispatching consists of allocating real-time service requests to a fleet of moving vehicles. In this paper, each vehicle is associated with a vector of attribute values...
Ilham Benyahia, Jean-Yves Potvin
CORR
2010
Springer
99views Education» more  CORR 2010»
15 years 26 days ago
INDECT Advanced Security Requirements
This paper reviews the requirements for the security mechanisms that are currently being developed in the framework of the European research project INDECT. An overview of features...
Manuel Urueña, Petr Machnik, Maria Martinez...