Sciweavers

149 search results - page 17 / 30
» Design of Network Topology in an Adversarial Environment
Sort
View
PEWASUN
2007
ACM
13 years 9 months ago
Worst-case lifetime computation of a wireless sensor network by model-checking
Wireless Sensor Network (WSN) technology is now mature enough to be used in numerous application domains. However, due to the restricted amount of energy usually allocated to each...
Laurent Mounier, Ludovic Samper, Wassim Znaidi
ISCAS
2005
IEEE
146views Hardware» more  ISCAS 2005»
14 years 1 months ago
A novel approach for network on chip emulation
— Current Systems-On-Chip execute applications that demand extensive parallel processing. Networks-On-Chip (NoC) provide a structured way of realizing interconnections on silicon...
Nicolas Genko, David Atienza, Giovanni De Micheli,...
SIGADA
2001
Springer
14 years 2 days ago
Targeting Ada95/DSA for distributed simulation of multiprotocol communication networks
The last years have seen an increasing, albeit restricted simulation of large-scale networks on shared memory parallel platforms. As the complexity of communication protocols and ...
Dhavy Gantsou
HICSS
2003
IEEE
143views Biometrics» more  HICSS 2003»
14 years 28 days ago
Formation, Routing, and Maintenance Protocols for the BlueRing Scatternet of Bluetooths
The basic networking unit in Bluetooth is piconet, and a larger-area Bluetooth network can be formed by multiple piconets, called scatternet. However, the structure of scatternets...
Ting-Yu Lin, Yu-Chee Tseng, Keng-Ming Chang, Chun-...
IJSN
2006
124views more  IJSN 2006»
13 years 7 months ago
Wireless networking security: open issues in trust, management, interoperation and measurement
: The pervasive availability and wide usage of wireless networks with different kinds of topologies, techniques and protocol suites have brought with them a need to improve securit...
Joseph B. Evans, Weichao Wang, Benjamin J. Ewy