Sciweavers

3899 search results - page 738 / 780
» Argumentation for Access Control
Sort
View
INFOCOM
2005
IEEE
14 years 1 months ago
Packetostatics: deployment of massively dense sensor networks as an electrostatics problem
— We investigate the spatial distribution of wireless nodes that can transport a given volume of traffic in a sensor network, while requiring the minimum number of wireless node...
Stavros Toumpis, Leandros Tassiulas
INFOCOM
2005
IEEE
14 years 1 months ago
RID: radio interference detection in wireless sensor networks
— In wireless sensor networks, many protocols assume that if node A is able to interfere with node B’s packet reception, then node B is within node A’s communication range. I...
Gang Zhou, Tian He, John A. Stankovic, Tarek F. Ab...
IWPC
2005
IEEE
14 years 1 months ago
Working Session: Textual Views of Source Code to Support Comprehension
Source code can be viewed in many ways, with each view facilitating access to different information contained within the code. In this working session, we will explore the role th...
Anthony Cox, Michael L. Collard
QEST
2005
IEEE
14 years 1 months ago
Workload Propagation - Overload in Bursty Servers
Internet servers are developing into complex but central components in the information infrastructure and are accessed by an ever-increasing and diversified user population. As s...
Qi Zhang, Alma Riska, Erik Riedel
MOBICOM
2005
ACM
14 years 1 months ago
Self-management in chaotic wireless deployments
Over the past few years, wireless networking technologies have made vast forays into our daily lives. Today, one can find 802.11 hardware and other personal wireless technology e...
Aditya Akella, Glenn Judd, Srinivasan Seshan, Pete...