Sciweavers

1661 search results - page 184 / 333
» Distributed Top-K Monitoring
Sort
View
154
Voted
JHSN
2006
267views more  JHSN 2006»
15 years 2 months ago
Client-side access control enforcement using trusted computing and PEI models
It has been recognized for some time that software alone does not provide an adequate foundation for building a high-assurance trusted platform. The emergence of industry-standard ...
Ravi S. Sandhu, Xinwen Zhang, Kumar Ranganathan, M...
118
Voted
AICOM
2005
108views more  AICOM 2005»
15 years 2 months ago
SIADEX: An interactive knowledge-based planner for decision support in forest fire fighting
SIADEX is a complex framework that integrates several AI techniques able to design fighting plans against forest fires. It is based on four main components, a web server, that cent...
Marc de la Asunción, Luis A. Castillo, Juan...
TSP
2008
147views more  TSP 2008»
15 years 2 months ago
Decentralized Activation in Dense Sensor Networks via Global Games
Decentralized activation in wireless sensor networks is investigated for energy-efficient monitoring using the theory of global games. Given a large number of sensors which can ope...
V. Krishnamurthy
CISIS
2009
IEEE
15 years 3 days ago
Lifetime in Wireless Sensor Networks
The following paper deals with criterion used to measure communication protocol efficiency in Wireless Sensor Networks. As energy is a crucial characteristic of those networks, it...
Julien Champ, Clément Saad, Anne-Elisabeth ...
CORR
2011
Springer
183views Education» more  CORR 2011»
14 years 9 months ago
Detecting Separation in Robotic and Sensor Networks
In this paper we consider the problem of monitoring detecting separation of agents from a base station in robotic and sensor networks. Such separation can be caused by mobility an...
Chenda Liao, Harshavardhan Chenji, Prabir Barooah,...