Sciweavers

1886 search results - page 325 / 378
» Verifying and Validating Simulation Models
Sort
View
TMC
2008
90views more  TMC 2008»
14 years 9 months ago
Trust-Based Fast Authentication for Multiowner Wireless Networks
In multiowner wireless networks, access points (APs) are owned and operated by different administrations, leading to significant authentication delays during handoff between APs. W...
Jahan Hassan, Harsha Sirisena, Björn Landfeld...
TWC
2008
156views more  TWC 2008»
14 years 9 months ago
Secure and Fault-Tolerant Event Boundary Detection in Wireless Sensor Networks
Event boundary detection is in and of itself a useful application in wireless sensor networks (WSNs). Typically, it includes the detection of a large-scale spatial phenomenon such ...
Kui Ren, Kai Zeng, Wenjing Lou
SIGMOD
2002
ACM
127views Database» more  SIGMOD 2002»
14 years 9 months ago
Workflow management with service quality guarantees
Workflow management systems (WFMS) that are geared for the orchestration of business processes across multiple organizations are complex distributed systems: they consist of multi...
Michael Gillmann, Gerhard Weikum, Wolfgang Wonner
ISCI
2010
111views more  ISCI 2010»
14 years 8 months ago
Effective vaccination policies
We present a framework for modeling the spread of pathogens throughout a population and generating policies that minimize the impact of those pathogens on the population. This fra...
L. Shaw, W. Spears, L. Billings, P. Maxim
COMPSAC
2010
IEEE
14 years 7 months ago
Behavior Monitoring in Self-Healing Service-Oriented Systems
Web services and service-oriented architecture (SOA) have become the de facto standard for designing distributed and loosely coupled applications. Many servicebased applications de...
Harald Psaier, Florian Skopik, Daniel Schall, Scha...