Sciweavers

19700 search results - page 3784 / 3940
» DNA-Based Computation Times
Sort
View
135
Voted
MOBIHOC
2005
ACM
16 years 3 months ago
The feasibility of launching and detecting jamming attacks in wireless networks
Wireless networks are built upon a shared medium that makes it easy for adversaries to launch jamming-style attacks. These attacks can be easily accomplished by an adversary emitt...
Wenyuan Xu, Wade Trappe, Yanyong Zhang, Timothy Wo...
127
Voted
EWSN
2008
Springer
16 years 3 months ago
Radio Characterization of 802.15.4 and Its Impact on the Design of Mobile Sensor Networks
Future mobile sensing systems are being designed using 802.15.4 low-power short-range radios for a diverse set of devices from embedded mobile motes to sensor-enabled cellphones in...
Emiliano Miluzzo, Xiao Zheng, Kristof Fodor, Andre...
111
Voted
MOBIHOC
2004
ACM
16 years 3 months ago
Frequency rolling: a cooperative frequency hopping for mutually interfering wpans
A Wireless Personal Area Network (WPAN) provides wireless links among proximate devices, usually carried by an individual. As WPAN gains momentum in ubiquitous usage, the interfer...
Petar Popovski, Hiroyuki Yomo, Sebastien Aprili
145
Voted
PLDI
2010
ACM
16 years 27 days ago
Breadcrumbs: Efficient Context Sensitivity for Dynamic Bug Detection Analyses
Calling context--the set of active methods on the stack--is critical for understanding the dynamic behavior of large programs. Dynamic program analysis tools, however, are almost ...
Michael D. Bond, Graham Z. Baker, Samuel Z. Guyer
133
Voted
SDM
2009
SIAM
144views Data Mining» more  SDM 2009»
16 years 21 days ago
On Segment-Based Stream Modeling and Its Applications.
The primary constraint in the effective mining of data streams is the large volume of data which must be processed in real time. In many cases, it is desirable to store a summary...
Charu C. Aggarwal
« Prev « First page 3784 / 3940 Last » Next »