Sciweavers

4485 search results - page 694 / 897
» Equivalences on Observable Processes
Sort
View
123
Voted
CDC
2008
IEEE
204views Control Systems» more  CDC 2008»
15 years 10 months ago
Dynamic ping optimization for surveillance in multistatic sonar buoy networks with energy constraints
— In this paper we study the problem of dynamic optimization of ping schedule in an active sonar buoy network deployed to provide persistent surveillance of a littoral area throu...
Anshu Saksena, I-Jeng Wang
136
Voted
CISS
2008
IEEE
15 years 10 months ago
Relay selection methods for wireless cooperative communications
— We study the problem of relay selection in a wireless cooperative network. Assuming a single source, a single destination, and N uniformly distributed candidate relays, we seek...
Seunghoon Nam, Mai Vu, Vahid Tarokh
129
Voted
DSN
2008
IEEE
15 years 10 months ago
Automatic security assessment of critical cyber-infrastructures
This research investigates the automation of security assessment of the static and dynamic properties of cyberinfrastructures, with emphasis on the electrical power grid. We descr...
Zahid Anwar, Ravinder Shankesi, Roy H. Campbell
GLOBECOM
2008
IEEE
15 years 10 months ago
Understanding P2P-TV Systems Through Real Measurements
—In this paper, we consider two popular peer-to-peer TV (P2P-TV) systems: PPLive, one of the today most widely used P2P-TV systems, and Joost, a promising new generation applicat...
Delia Ciullo, Marco Mellia, Michela Meo, Emilio Le...
HASE
2008
IEEE
15 years 10 months ago
Securing Sensor Nodes Against Side Channel Attacks
Side channel attacks are non-invasive attacks in which adversaries gain confidential information by passively observing the target computing device. Sensor nodes are particularly...
Kanthakumar Pongaliur, Zubin Abraham, Alex X. Liu,...