Sciweavers

3984 search results - page 744 / 797
» Using linked data for systems management
Sort
View
IPSN
2010
Springer
15 years 1 months ago
Practical modeling and prediction of radio coverage of indoor sensor networks
The robust operation of many sensor network applications depends on deploying relays to ensure wireless coverage. Radio mapping aims to predict network coverage based on a small n...
Octav Chipara, Gregory Hackmann, Chenyang Lu, Will...
CGF
2008
84views more  CGF 2008»
14 years 10 months ago
Visualizing Underwater Ocean Optics
Simulating the in-water ocean light field is a daunting task. Ocean waters are one of the richest participating media, where light interacts not only with water molecules, but wit...
Diego Gutierrez, Francisco J. Serón, Adolfo...
IJNSEC
2007
253views more  IJNSEC 2007»
14 years 9 months ago
Stream or Block Cipher for Securing VoIP?
When the network is homogeneous, choosing the cipher type for a packet telephony application is simple. It is clear that stream ciphers perform better than block ciphers over land...
Ashraf D. Elbayoumy, Simon J. Shepherd
IPPS
2010
IEEE
14 years 7 months ago
Distributed monitoring of conditional entropy for anomaly detection in streams
In this work we consider the problem of monitoring information streams for anomalies in a scalable and efficient manner. We study the problem in the context of network streams wher...
Chrisil Arackaparambil, Sergey Bratus, Joshua Brod...
CCS
2009
ACM
15 years 4 months ago
A practical property-based bootstrap architecture
Binary attestation, as proposed by the Trusted Computing Group (TCG), is a pragmatic approach for software integrity protection and verification. However, it has also various sho...
René Korthaus, Ahmad-Reza Sadeghi, Christia...