Sciweavers

273 search results - page 35 / 55
» Bayesian Communication under Rough Sets Information
Sort
View
INFOCOM
2007
IEEE
14 years 1 months ago
Detecting Phantom Nodes in Wireless Sensor Networks
—In an adversarial environment, various kinds of security attacks become possible if malicious nodes could claim fake locations that are different from where they are physically ...
Joengmin Hwang, Tian He, Yongdae Kim
IJCAI
1989
13 years 8 months ago
Negotiation and Task Sharing Among Autonomous Agents in Cooperative Domains
Research in Distributed Artificial Intelligence is concerned with how automated agents can be designed to interact effectively. One important capability that could aid inter-agent...
Gilad Zlotkin, Jeffrey S. Rosenschein
VTS
2005
IEEE
96views Hardware» more  VTS 2005»
14 years 28 days ago
Implementing a Scheme for External Deterministic Self-Test
A new method for test resource partitioning is introduced which keeps the design-for-test logic independent of the test set and moves the test pattern dependent information to an ...
Abdul Wahid Hakmi, Hans-Joachim Wunderlich, Valent...
GLOBECOM
2009
IEEE
14 years 2 months ago
Downlink Mobile OFDMA Resource Allocation with Minimum User Rate Requests
— The problem of resource allocation (RA) in a downlink OFDMA system with minimum user rate requests is examined under the realistic scenario of partial (imperfect) channel state...
Stelios Stefanatos, Christos Papathanasiou, Nikos ...
CORR
2010
Springer
152views Education» more  CORR 2010»
13 years 7 months ago
Deploying Wireless Networks with Beeps
Abstract. We present the discrete beeping communication model, which assumes nodes have minimal knowledge about their environment and severely limited communication capabilities. S...
Alejandro Cornejo, Fabian Kuhn