Sciweavers

5493 search results - page 878 / 1099
» Effectively Polynomial Simulations
Sort
View
151
Voted
TPDS
2008
161views more  TPDS 2008»
15 years 3 months ago
Distributed Deployment Schemes for Mobile Wireless Sensor Networks to Ensure Multilevel Coverage
One of the key research issues in wireless sensor networks (WSNs) is how to efficiently deploy sensors to cover an area. In this paper, we solve the k-coverage sensor deployment pr...
You-Chiun Wang, Yu-Chee Tseng
135
Voted
TR
2008
107views more  TR 2008»
15 years 3 months ago
A New Shared Segment Protection Method for Survivable Networks with Guaranteed Recovery Time
Shared Segment Protection (SSP), compared with Shared Path Protection (SPP), and Shared Link Protection (SLP), provides an optimal protection configuration due to the ability of ma...
János Tapolcai, Pin-Han Ho, Dominique Verch...
127
Voted
TSMC
2008
94views more  TSMC 2008»
15 years 3 months ago
Queuing Network Modeling of a Real-Time Psychophysiological Index of Mental Workload - P300 in Event-Related Potential (ERP)
Modeling and predicting of mental workload are among the most important issues in studying human performance in complex systems. Ample research has shown that the amplitude of the ...
Changxu Wu, Yili Liu, C. M. Quinn-Walsh
135
Voted
JNCA
2007
75views more  JNCA 2007»
15 years 3 months ago
Stateful DDoS attacks and targeted filtering
The goal of a DDoS (distributed denial of service) attack is to completely tie up certain resources so that legitimate users are not able to access a service. It has long been an ...
Shigang Chen, Yong Tang, Wenliang Du
150
Voted
JPDC
2007
191views more  JPDC 2007»
15 years 3 months ago
Clustering wireless ad hoc networks with weakly connected dominating set
The increasing popular personal communications and mobile computing require a wireless network infrastructure that supports selfconfiguration and self-management. Efficient clus...
Bo Han, Weijia Jia