Sciweavers

1056 search results - page 155 / 212
» Identifying and Exploiting Ultrametricity
Sort
View
JSAC
2010
86views more  JSAC 2010»
13 years 6 months ago
A randomized countermeasure against parasitic adversaries in wireless sensor networks
—Due to their limited capabilities, wireless sensor nodes are subject to physical attacks that are hard to defend against. In this paper, we first identify a typical attacker, c...
Panagiotis Papadimitratos, Jun Luo, Jean-Pierre Hu...
JUCS
2010
154views more  JUCS 2010»
13 years 6 months ago
An Ambient Assisted Living Platform Integrating RFID Data-on-Tag Care Annotations and Twitter
: Although RFID is mainly used to identify objects whose data can then be accessed over the network, passive HF RFID tags do have significant data storage capacity (up to 4K), whic...
Diego López-de-Ipiña, Ignacio D&iacu...
TCOM
2010
141views more  TCOM 2010»
13 years 6 months ago
Communications over the Best Singular Mode of a Reciprocal MIMO Channel
We consider two nodes equipped with multiple antennas that intend to communicate i.e. both of which transmit and receive data. We model the responses of the communication channels...
Saeed Gazor, Khalid AlSuhaili
DATESO
2010
96views Database» more  DATESO 2010»
13 years 5 months ago
A Framework for Efficient Design, Maintaining, and Evolution of a System of XML Applications
Abstract. The today's applications usually form a system of sub-applications, each being responsible for a particular functionality. Hence, the design and maintenance of such ...
Martin Necaský, Irena Mlýnková...
DOLAP
2010
ACM
13 years 5 months ago
Relational versus non-relational database systems for data warehousing
Relational database systems have been the dominating technology to manage and analyze large data warehouses. Moreover, the ER model, the standard in database design, has a close r...
Carlos Ordonez, Il-Yeol Song, Carlos Garcia-Alvara...