Sciweavers

451 search results - page 81 / 91
» Constrained Sums of Information Systems
Sort
View
IJSN
2008
145views more  IJSN 2008»
13 years 8 months ago
Clique-based group key assignment in Wireless Sensor Networks
: Security has become the corner stone of research in wireless sensor networks (WSNs). Due to the unique operational environment of WSNs, where the communication medium is open to ...
Avinash Srinivasan, Feng Li, Jie Wu, Minglu Li
INFOCOM
2009
IEEE
14 years 3 months ago
On Fast Optimal STDMA Scheduling over Fading Wireless Channels
—Most prior studies on wireless spatial-reuse TDMA (STDMA) link scheduling for throughput optimization deal with the situation where instantaneous channel state information (CSI)...
JiaLiang Zhang, Soung Chang Liew, Liqun Fu
INFOCOM
2007
IEEE
14 years 2 months ago
Routing with a Markovian Metric to Promote Local Mixing
— Routing protocols have traditionally been based on finding shortest paths under certain cost metrics. A conventional routing metric models the cost of a path as the sum of the...
Yunnan Wu, Saumitra M. Das, Ranveer Chandra
ADBIS
2000
Springer
188views Database» more  ADBIS 2000»
14 years 23 days ago
Algorithms for Rewriting Aggregate Queries Using Views
Queries involving aggregation are typical in a number of database research areas, such as data warehousing, global information systems and mobile computing. One of the main ideas ...
Sara Cohen, Werner Nutt, Alexander Serebrenik
BMCBI
2008
160views more  BMCBI 2008»
13 years 8 months ago
VariVis: a visualisation toolkit for variation databases
Background: With the completion of the Human Genome Project and recent advancements in mutation detection technologies, the volume of data available on genetic variations has rise...
Timothy D. Smith, Richard G. H. Cotton