Sciweavers

1661 search results - page 184 / 333
» Distributed Top-K Monitoring
Sort
View
JHSN
2006
267views more  JHSN 2006»
13 years 10 months ago
Client-side access control enforcement using trusted computing and PEI models
It has been recognized for some time that software alone does not provide an adequate foundation for building a high-assurance trusted platform. The emergence of industry-standard ...
Ravi S. Sandhu, Xinwen Zhang, Kumar Ranganathan, M...
AICOM
2005
108views more  AICOM 2005»
13 years 10 months ago
SIADEX: An interactive knowledge-based planner for decision support in forest fire fighting
SIADEX is a complex framework that integrates several AI techniques able to design fighting plans against forest fires. It is based on four main components, a web server, that cent...
Marc de la Asunción, Luis A. Castillo, Juan...
TSP
2008
147views more  TSP 2008»
13 years 10 months ago
Decentralized Activation in Dense Sensor Networks via Global Games
Decentralized activation in wireless sensor networks is investigated for energy-efficient monitoring using the theory of global games. Given a large number of sensors which can ope...
V. Krishnamurthy
CISIS
2009
IEEE
13 years 8 months ago
Lifetime in Wireless Sensor Networks
The following paper deals with criterion used to measure communication protocol efficiency in Wireless Sensor Networks. As energy is a crucial characteristic of those networks, it...
Julien Champ, Clément Saad, Anne-Elisabeth ...
CORR
2011
Springer
183views Education» more  CORR 2011»
13 years 5 months ago
Detecting Separation in Robotic and Sensor Networks
In this paper we consider the problem of monitoring detecting separation of agents from a base station in robotic and sensor networks. Such separation can be caused by mobility an...
Chenda Liao, Harshavardhan Chenji, Prabir Barooah,...