Sciweavers

2845 search results - page 419 / 569
» Constraints over Ontologies
Sort
View
EDOC
2007
IEEE
14 years 3 months ago
Incorporating Security Behaviour into Business Models Using a Model Driven Approach
There has, in recent years, been growing interest in Model Driven Engineering (MDE), in which models are the primary design artifacts and transformations are applied to these mode...
Peter F. Linington, Pulitha Liyanagama
GLOBECOM
2007
IEEE
14 years 3 months ago
Frequency Agile Interference-Aware Channel Sounding for Dynamic Spectrum Access Networks
— In this paper, we propose a novel channel sounding technique, called the multicarrier direct sequence swept time delay cross-correlation (MC-DS-STDCC), which is designed to min...
Qi Chen, Alexander M. Wyglinski, Gary J. Minden
GLOBECOM
2007
IEEE
14 years 3 months ago
Transmission Schemes for Lifetime Maximization in Wireless Sensor Networks: Uncorrelated Source Observations
Abstract— We study transmission schemes for lifetime maximization in wireless sensor networks. Specifically we consider the network where all the sensors observe uncorrelated si...
Xiaolu Zhang, Meixia Tao, Chun Sum Ng
ICC
2007
IEEE
130views Communications» more  ICC 2007»
14 years 3 months ago
A Novel Key Redistribution Scheme for Wireless Sensor Networks
— Key management has long been a challenging problem in wireless Distributed Sensor Networks (DSNs) due to their high security requirements and strict resource constraints. Recen...
Chun-Fai Law, Ka-Shun Hung, Yu-Kwong Kwok
ICC
2007
IEEE
121views Communications» more  ICC 2007»
14 years 3 months ago
Structure and Optimality of Myopic Sensing for Opportunistic Spectrum Access
We consider opportunistic spectrum access for secondary users over multiple channels whose occupancy by primary users is modeled as discrete-time Markov processes. Due to hardware...
Qing Zhao, Bhaskar Krishnamachari