Sciweavers

672 search results - page 110 / 135
» Analysis and applications of timed service protocols
Sort
View
TMC
2012
11 years 11 months ago
Protecting Location Privacy in Sensor Networks against a Global Eavesdropper
— While many protocols for sensor network security provide confidentiality for the content of messages, contextual information usually remains exposed. Such information can be c...
Kiran Mehta, Donggang Liu, Matthew Wright
CCGRID
2005
IEEE
14 years 2 months ago
Performance evaluation of JXTA communication layers
— The arrival of the P2P model has opened many new avenues for research within the field of distributed computing. This is mainly due to important practical features (such as su...
Gabriel Antoniu, Philip J. Hatcher, Mathieu Jan, D...
DASFAA
2006
IEEE
153views Database» more  DASFAA 2006»
14 years 2 months ago
DAPSS: Exact Subsequence Matching for Data Streams
There is much interest in the processing of data streams for applications in the fields such as financial analysis, network monitoring, mobile services, and sensor network manage...
Yasuhiro Fujiwara, Yasushi Sakurai, Masashi Yamamu...
ICDM2
2004
Springer
196views Data Mining» more  ICDM2 2004»
14 years 2 months ago
An Early Warning System for Vehicle Related Quality Data
Vehicle production audit tests, warranty claims and car control unit data are stored in a central data warehouse for data mining analysis. Neural network based part failure rate es...
Matthias Grabert, Markus Prechtel, Tomas Hrycej, W...
ECRTS
1999
IEEE
14 years 1 months ago
Adding local priority-based dispatching mechanisms to P-NET networks: a fixed priority approach
In this paper we address the real-time capabilities of P-NET, which is a multi-master fieldbus standard based on a virtual token passing scheme. We show how P-NET's medium ac...
Eduardo Tovar, Francisco Vasques, Alan Burns