Sciweavers

1209 search results - page 219 / 242
» Developing and deploying sensor network applications with An...
Sort
View
NETGAMES
2003
ACM
14 years 29 days ago
Experiences using a dual wireless technology infrastructure to support ad-hoc multiplayer games
Multiplayer games for mobile wireless devices are becoming increasingly popular. Many modern devices such as PDAs or mobile telephones are equipped with Bluetooth interfaces. Blue...
Hartmut Ritter, Thiemo Voigt, Min Tian, Jochen H. ...
ICDE
2012
IEEE
240views Database» more  ICDE 2012»
11 years 10 months ago
Ego-centric Graph Pattern Census
—There is increasing interest in analyzing networks of all types including social, biological, sensor, computer, and transportation networks. Broadly speaking, we may be interest...
Walaa Eldin Moustafa, Amol Deshpande, Lise Getoor
HICSS
2003
IEEE
92views Biometrics» more  HICSS 2003»
14 years 1 months ago
Distributed Energy-conserving Routing Protocols
This paper discusses several distributed poweraware routing protocols in wireless ad-hoc networks (especially sensor networks). We seek to optimize the lifetime of the network. We...
Qun Li, Javed A. Aslam, Daniela Rus
DSN
2006
IEEE
14 years 1 months ago
BlueGene/L Failure Analysis and Prediction Models
The growing computational and storage needs of several scientific applications mandate the deployment of extreme-scale parallel machines, such as IBM’s BlueGene/L which can acc...
Yinglung Liang, Yanyong Zhang, Anand Sivasubramani...
RAID
2005
Springer
14 years 1 months ago
Defending Against Injection Attacks Through Context-Sensitive String Evaluation
Abstract. Injection vulnerabilities pose a major threat to applicationlevel security. Some of the more common types are SQL injection, crosssite scripting and shell injection vulne...
Tadeusz Pietraszek, Chris Vanden Berghe