Sciweavers

804 search results - page 92 / 161
» How to Break Access Control in a Controlled Manner
Sort
View
168
Voted
WCNC
2010
IEEE
15 years 8 months ago
A Reliable Energy-Efficient 802.15.4-Based MAC Protocol for Wireless Sensor Networks
—The IEEE 802.15.4 standard was developed for the purpose of media access control of low power wireless personal area networks. Wireless sensor network devices have the general c...
Yasser Gadallah, Mariam Jaafari
125
Voted
DAIS
2003
15 years 6 months ago
A Variable Cache Consistency Protocol for Mobile Systems Using Time Locks
Abstract. By locally caching data, mobile hosts can operate while disconnected from the central server, however, consistency of data becomes more difficult to maintain. In this pap...
Abhinav Vora, Zahir Tari, Peter Bertók
151
Voted
JSAC
2007
142views more  JSAC 2007»
15 years 4 months ago
Non-Cooperative Resource Competition Game by Virtual Referee in Multi-Cell OFDMA Networks
— In this paper, a distributive non-cooperative game is proposed to perform sub-channel assignment, adaptive modulation, and power control for multi-cell multi-user Orthogonal Fr...
Zhu Han, Zhu Ji, K. J. Ray Liu
ICRA
2010
IEEE
158views Robotics» more  ICRA 2010»
15 years 2 months ago
A measurement distribution framework for cooperative navigation using multiple AUVs
Abstract-- In recent years underwater survey and surveillance missions with more than a single Autonomous Underwater Vehicle (AUV) have become more common thanks to more reliable a...
Maurice F. Fallon, Georgios Papadopoulos, John J. ...
EKNOW
2009
15 years 2 months ago
Towards a Context-Based Dialog Management Layer for Expert Systems
Knowledge engineering relies on a unified effort of two components for success: 1) a strong expert knowledge back-end, and 2) an effective user interface. We address the latter is...
Victor Chou Hung, Avelino J. Gonzalez, Ronald F. D...