Sciweavers

2116 search results - page 289 / 424
» On Probabilistic Alternating Simulations
Sort
View
COMCOM
2007
136views more  COMCOM 2007»
15 years 4 months ago
A Delaunay Triangulation based method for wireless sensor network deployment
To obtain a satisfied performance of wireless sensor network, an adaptable sensor deployment method for various applications is essential. In this paper, we propose a centralized ...
Chun-Hsien Wu, Kuo-Chuan Lee, Yeh-Ching Chung
JCM
2008
77views more  JCM 2008»
15 years 4 months ago
In-Field Attack Proof of Injected False Data in Sensor Networks
In a large-scale sensor network individual sensors can be compromised to inject bogus sensing reports. While SEF can filter out the outfield false reports, it is incapable of detec...
Zheng Wang, Xiaodong Lee, Xinchang Zhang, Baoping ...
CORR
2007
Springer
119views Education» more  CORR 2007»
15 years 4 months ago
Distributed Source Coding in the Presence of Byzantine Sensors
—The distributed source coding problem is considered when the sensors, or encoders, are under Byzantine attack; that is, an unknown group of sensors have been reprogrammed by a m...
Oliver Kosut, Lang Tong
JAIR
2006
137views more  JAIR 2006»
15 years 4 months ago
Learning Sentence-internal Temporal Relations
In this paper we propose a data intensive approach for inferring sentence-internal temporal relations. Temporal inference is relevant for practical NLP applications which either e...
Maria Lapata, Alex Lascarides
JPDC
2008
122views more  JPDC 2008»
15 years 4 months ago
Stochastic robustness metric and its use for static resource allocations
This research investigates the problem of robust static resource allocation for distributed computing systems operating under imposed Quality of Service (QoS) constraints. Often, ...
Vladimir Shestak, Jay Smith, Anthony A. Maciejewsk...