|
|
|
|
|
|
Date Reviewed |
|
|
1 - 10 of 10
reviews
|
|
|
|
|
|
|
|
Security and protection of SCADA: a bigdata algorithmic approach Shyamasundar R. SIN 2013 (Proceedings of the 6th International Conference on Security of Information and Networks, Aksaray, Turkey, Nov 26-28, 2013) 20-27, 2013. Type: Proceedings
Embedded systems work between hardware and software to perform a specific function. These systems are usually part of a larger system, and wireless communication among the components of the larger system is common. Therefore, it is imp...
|
Apr 16 2014 |
|
|
|
|
|
|
Collaborative relaying strategies in autonomic management of mobile robotics Barraca J., Sadeghi R., Aguiar R. Wireless Personal Communications: An International Journal 70(3): 1077-1096, 2013. Type: Article
Mobile robots are becoming increasingly common in our domestic and professional environments, from small autonomous vacuum cleaners, such as the iRobot Roomba, and lawnmowers, such as the Husqvarna Automower, to more sophisticated auto...
|
Oct 24 2013 |
|
|
|
|
|
|
Explicit coordination to prevent congestion in data center networks Rajanna V., Jahagirdar A., Shah S., Gopalan K. Cluster Computing 15(2): 183-200, 2012. Type: Article
An important study on preventing congestion in data centers using cloud computing platforms is presented in this paper. The authors propose a new framework prototype, XCo, that helps in the prevention of network congestion. More than j...
|
Jan 7 2013 |
|
|
|
|
|
|
Capacity bounds of three-dimensional wireless ad hoc networks Li P., Pan M., Fang Y. IEEE/ACM Transactions on Networking 20(4): 1304-1315, 2012. Type: Article
Vehicular ad hoc networks (VANETs), mesh networks, and other kinds of networks are constantly used in the context of unmanned aerial and ground vehicles. This paper proposes the use of 3D wireless ad hoc networks to allow the fusion of...
|
Dec 11 2012 |
|
|
|
|
|
|
Networks for pervasive services: six ways to upgrade the Internet Liotta A., Exarchakos G., Springer Publishing Company, Incorporated, New York, NY, 2011. 190 pp. Type: Book (978-9-400714-72-4)
In addition to its coverage of computer networks, this book provides a new way to see network concepts. The book’s title makes it clear that its focus is quite different from the approach taken by traditional books. This book...
|
Sep 6 2011 |
|
|
|
|
|
|
Integration of false data detection with data aggregation and confidential transmission in wireless sensor networks Ozdemir S., Çam H. IEEE/ACM Transactions on Networking 18(3): 736-749, 2010. Type: Article
Wireless sensor networks (WSNs) are an important topic these days. Their use is related to a wide variety of applications, from sensor nodes placed at strategic locations to detect environmental information, to composing a mobile wirel...
|
Jul 20 2011 |
|
|
|
|
|
|
Social networking technology and the virtues Vallor S. Ethics and Information Technology 12(2): 157-170, 2010. Type: Article
Social networks are considered important to people’s relationships. However, just like any other network, they have problems--in this case, the inherent problems no longer take the form of communication, but refer to...
|
Oct 29 2010 |
|
|
|
|
|
|
Peer-assisted view-dependent progressive mesh streaming Cheng W., Liu D., Ooi W. MM 2009 (Proceedings of the 17th ACM International Conference on Multimedia, Beijing, China, Oct 19-24, 2009) 441-450, 2009. Type: Proceedings
This paper describes new challenges in the use (design) of peer-to-peer (P2P) mesh streaming. It contextualizes and presents all the advantages and disadvantages of using P2P technology to download three-dimensional (3D) meshes. It exp...
|
May 12 2010 |
|
|
|
|
|
|
On anonymity in an electronic society: a survey of anonymous communication systems Edman M., Yener B. ACM Computing Surveys 42(1): 1-35, 2009. Type: Article
Edman and Yener provide in this paper a complete and clear survey of anonymity. They start by defining terms, to unify the terminologies. Some taxonomies found in the paper would allow researchers and developers to classify and define ...
|
Mar 23 2010 |
|
|
|
|
|
|
Numerical computation algorithms for sequential checkpoint placement Ozaki T., Dohi T., Kaio N. Performance Evaluation 66(6): 311-326, 2009. Type: Article
In this paper, Ozaki, Dohi, and Kaio discuss the problem of checkpoint placement, focusing on dependability in a centralized system. The dependability measures are steady-state system availability and expected reward per unit time in t...
|
Nov 12 2009 |
|
|
|
|
|
|
|
|
|
|
|