Sciweavers

4004 search results - page 86 / 801
» How Many Packets Can We Encode
Sort
View
SEMWEB
2010
Springer
15 years 14 days ago
When owl: sameAs Isn't the Same: An Analysis of Identity in Linked Data
Abstract. In Linked Data, the use of owl:sameAs is ubiquitous in interlinking data-sets. There is however, ongoing discussion about its use, and potential misuse, particularly with...
Harry Halpin, Patrick J. Hayes, James P. McCusker,...
132
Voted
WINET
2008
200views more  WINET 2008»
15 years 2 months ago
Performance evaluation of an IEEE 802.15.4 sensor network with a star topology
One class of applications envisaged for the IEEE 802.15.4 LR-WPAN (low data rate - wireless personal area network) standard is wireless sensor networks for monitoring and control a...
Chandramani Kishore Singh, Anurag Kumar, P. M. Ame...
140
Voted
NDSS
2008
IEEE
15 years 9 months ago
Automatic Network Protocol Analysis
Protocol reverse engineering is the process of extracting application-level specifications for network protocols. Such specifications are very helpful in a number of security-re...
Gilbert Wondracek, Paolo Milani Comparetti, Christ...
INFOCOM
2010
IEEE
15 years 1 months ago
Random Walks on Digraphs: A Theoretical Framework for Estimating Transmission Costs in Wireless Routing
—In this paper we develop a unified theoretical framework for estimating various transmission costs of packet forwarding in wireless networks. Our framework can be applied to th...
Yanhua Li, Zhi-Li Zhang
139
Voted
MOBIHOC
2006
ACM
16 years 2 months ago
Balancing distance and lifetime in delay constrained ad hoc networks
This paper addresses the problem of optimizing the packet transmission schedule in an ad hoc network with end-toend delay constraints. The emphasis is to determine the proper rela...
Ben Liang, Min Dong