Sciweavers

2715 search results - page 220 / 543
» Network bucket testing
Sort
View
JCM
2006
118views more  JCM 2006»
13 years 10 months ago
Joint Optimization of Local and Fusion Rules in a Decentralized Sensor Network
Decentralized sensor networks are collections of individual local sensors that observe a common phenomenon, quantize their observations, and send this quantized information to a ce...
Nithya Gnanapandithan, Balasubramaniam Natarajan
JOIN
2006
113views more  JOIN 2006»
13 years 10 months ago
Local Detection of Selfish Routing Behavior in Ad Hoc Networks
Reputation mechanisms for detecting and punishing free-riders in ad hoc networks depend on the local detection of selfish behavior. Although naive selfish strategies based on drop...
Bo Wang 0001, Sohraab Soltani, Jonathan K. Shapiro...
SIGMETRICS
2008
ACM
111views Hardware» more  SIGMETRICS 2008»
13 years 10 months ago
Predicting the resource consumption of network intrusion detection systems
Abstract. When installing network intrusion detection systems (NIDSs), operators are faced with a large number of parameters and analysis options for tuning trade-offs between dete...
Holger Dreger, Anja Feldmann, Vern Paxson, Robin S...
CCE
2005
13 years 10 months ago
New rigorous one-step MILP formulation for heat exchanger network synthesis
In this paper, a rigorous MILP formulation for grass-root design of heat exchanger networks is developed. The methodology does not rely on traditional supertargeting followed by n...
Andrés F. Barbaro, Miguel J. Bagajewicz
TWC
2008
172views more  TWC 2008»
13 years 10 months ago
A Software-Defined Radio System for Backscatter Sensor Networks
Backscatter radio is proposed for sensor networks. In that way, the transmitter for each sensor is simplified to a transistor connected to an antenna and therefore, the cost for ea...
Giovanni Vannucci, Aggelos Bletsas, Darren Leigh