Sciweavers

1661 search results - page 269 / 333
» Distributed Top-K Monitoring
Sort
View
AINA
2004
IEEE
14 years 1 months ago
Authenticated Autonomous System Traceback
The design of the IP protocol makes it difficult to reliably identify the originator of an IP packet making the defense against Distributed Denial of Service attacks one of the ha...
Vamsi Paruchuri, Arjan Durresi, Rajgopal Kannan, S...
DMSN
2006
ACM
14 years 1 months ago
Processing proximity queries in sensor networks
Sensor networks are often used to perform monitoring tasks, such as in animal or vehicle tracking and in surveillance of enemy forces in military applications. In this paper we in...
Yannis Kotidis
LCPC
2000
Springer
14 years 1 months ago
SmartApps: An Application Centric Approach to High Performance Computing
State-of-the-art run-time systems are a poor match to diverse, dynamic distributed applications because they are designed to provide support to a wide variety of applications, with...
Lawrence Rauchwerger, Nancy M. Amato, Josep Torrel...
MA
2000
Springer
114views Communications» more  MA 2000»
14 years 1 months ago
Saving Energy and Providing Value Added Services in Intelligent Buildings: A MAS Approach
In a de-regulated market the distribution utilities will compete with added value for the customer in addition to the delivery of energy. We describe a system consisting of a colle...
Paul Davidsson, Magnus Boman
EWSN
2010
Springer
14 years 1 months ago
An Adaptive Strategy for Energy-Efficient Data Collection in Sparse Wireless Sensor Networks
Sparse wireless sensor networks (WSNs) are being effectively used in several applications, which include transportation, urban safety, environment monitoring, and many others. Sens...
Mario Di Francesco, Kunal Shah, Mohan Kumar, Giuse...