Sciweavers

31387 search results - page 6207 / 6278
» Abstracting abstract machines
Sort
View
CORR
2010
Springer
177views Education» more  CORR 2010»
13 years 5 months ago
AntiJam: Efficient Medium Access despite Adaptive and Reactive Jamming
Abstract--Intentional interference constitutes a major threat for communication networks operating over a shared medium where availability is imperative. Jamming attacks are often ...
Andréa W. Richa, Christian Scheideler, Stef...
DBSEC
2010
196views Database» more  DBSEC 2010»
13 years 5 months ago
Preserving Integrity and Confidentiality of a Directed Acyclic Graph Model of Provenance
Abstract. This paper describes how to preserve integrity and confidentiality of a directed acyclic graph (DAG) model of provenance database. We show a method to preserve integrity ...
Amril Syalim, Takashi Nishide, Kouichi Sakurai

Publication
181views
13 years 5 months ago
Causality Applicatoin Ontology: A Therory of Definition Derived From Analytical Meditation
Advancing the synthesis of Eastern mind science with Western physical science will require a robust and easy-to-traverse bridge between the atypical apprehensions within meditation...
Samuel R Dismond III
GLOBECOM
2008
IEEE
14 years 3 months ago
Optimal Location Updates in Mobile Ad Hoc Networks: A Separable Cost Case
Abstract—We consider the location service in a mobile adhoc network (MANET), where each node needs to maintain its location information in the network by (i) frequently updating ...
Zhenzhen Ye, Alhussein A. Abouzeid
ADHOC
2011
13 years 3 months ago
MC-LMAC: A multi-channel MAC protocol for wireless sensor networks
Abstract—In traditional wireless sensor network (WSN) applications, energy efficiency is considered to be the most important concern whereas utilizing the use of bandwidth and m...
Özlem Durmaz Incel, Lodewijk van Hoesel, Pier...
« Prev « First page 6207 / 6278 Last » Next »