Sciweavers

2699 search results - page 473 / 540
» On Evaluating the Performance of Security Protocols
Sort
View
HPCC
2007
Springer
14 years 1 months ago
CDACAN: A Scalable Structured P2P Network Based on Continuous Discrete Approach and CAN
Abstract. CAN is a famous structured peer-to-peer network based on ddimensional torus topology with constant degree and logarithmical diameter, but suffers from poor scalability wh...
Lingwei Li, Qunwei Xue, Deke Guo
MSN
2007
Springer
151views Sensor Networks» more  MSN 2007»
14 years 1 months ago
A Low Latency MAC Scheme for Event-Driven Wireless Sensor Networks
In this paper, we present a low latency media access control scheme which we call LLMAC (Low Latency MAC) for event-driven wireless sensor networks (WSN). In this kind of WSN, sens...
Hung-Cuong Le, Hervé Guyennet, Violeta Fele...
UIC
2007
Springer
14 years 1 months ago
Maximizing Network Lifetime Under Reliability Constraints Using a Cross-Layer Design in Dense Wireless Sensor Networks
Abstract. Recent experimental studies have shown that radio links between low-power devices are extremely unreliable. In particular, the instability and unpredictability of low-pow...
Shan Guo Quan, Young Yong Kim
AIPR
2006
IEEE
14 years 1 months ago
Recovering Spheres from 3D Point Data
The National Institute of Standards and Technology is involved in developing standard protocols for the performance evaluation of 3D imaging systems, which include laser scanners ...
Christoph Witzgall, Geraldine S. Cheok, Anthony J....
BROADNETS
2006
IEEE
14 years 1 months ago
A Statistical Approach to Anomaly Detection in Interdomain Routing
Abstract— A number of events such as hurricanes, earthquakes, power outages can cause large-scale failures in the Internet. These in turn cause anomalies in the interdomain routi...
Shivani Deshpande, Marina Thottan, Tin Kam Ho, Bip...