Sciweavers

1058 search results - page 158 / 212
» Fault-Tolerant Resource Reasoning
Sort
View
134
Voted
RTSS
2003
IEEE
15 years 9 months ago
JAM: A Jammed-Area Mapping Service for Sensor Networks
Preventing denial-of-service attacks in wireless sensor networks is difficult primarily because of the limited resources available to network nodes and the ease with which attacks...
Anthony D. Wood, John A. Stankovic, Sang Hyuk Son
135
Voted
TPHOL
2003
IEEE
15 years 9 months ago
Program Extraction from Large Proof Developments
Abstract. It is well known that mathematical proofs often contain (abstract) algorithms, but although these algorithms can be understood by a human, it still takes a lot of time an...
Luís Cruz-Filipe, Bas Spitters
125
Voted
ICCS
2003
Springer
15 years 8 months ago
Export Behaviour Modeling Using EvoNF Approach
The academic literature suggests that the extent of exporting by multinational corporation subsidiaries (MCS) depends on their product manufactured, resources, tax protection, cus...
Ron Edwards, Ajith Abraham, Sonja Petrovic-Lazarev...
106
Voted
IPSN
2003
Springer
15 years 8 months ago
Mobicast: Just-in-Time Multicast for Sensor Networks under Spatiotemporal Constraints
This paper is concerned with coordinated delivery of messages in sensor networks. The notion of multicast is re-examined in light of a new set of requirements that are specific t...
Qingfeng Huang, Chenyang Lu, Gruia-Catalin Roman
137
Voted
IPTPS
2003
Springer
15 years 8 months ago
Rationality and Self-Interest in Peer to Peer Networks
Much of the existing work in peer to peer networking assumes that users will follow prescribed protocols without deviation. This assumption ignores the user’s ability to modify ...
Jeffrey Shneidman, David C. Parkes