Sciweavers

1528 search results - page 72 / 306
» On Signatures for Communication Graphs
Sort
View
ICC
2007
IEEE
101views Communications» more  ICC 2007»
14 years 2 months ago
Transmission Scheduling in Sensor Networks via Directed Edge Coloring
— This paper presents a transmission scheduling scheme in sensor networks. Each node is assigned a list of time slots to use for unicast and broadcast communication. The algorith...
Maggie X. Cheng, Li Yin
ISSS
1998
IEEE
104views Hardware» more  ISSS 1998»
13 years 12 months ago
Synchronization Detection for Multi-Process Hierarchical Synthesis
Complex system specifications are often hierarchically composed of several subsystems. Each subsystem contains one or more processes. In order to provide optimization across diffe...
Oliver Bringmann, Wolfgang Rosenstiel, Dirk Reicha...
GLOBECOM
2007
IEEE
14 years 2 months ago
Reliable Symbol Synchronization in Software-Driven Acoustic Sensor Networks
Abstract—Symbol synchronization in traditional hardwaredriven communication systems has relied on the transmission of training sequences of symbols just before the beginning of t...
Raja Jurdak, Antonio G. Ruzzelli, Gregory M. P. O'...
CCS
2006
ACM
13 years 11 months ago
A scalable approach to attack graph generation
Attack graphs are important tools for analyzing security vulnerabilities in enterprise networks. Previous work on attack graphs has not provided an account of the scalability of t...
Xinming Ou, Wayne F. Boyer, Miles A. McQueen
DIALM
2005
ACM
203views Algorithms» more  DIALM 2005»
13 years 9 months ago
Topological hole detection in wireless sensor networks and its applications
The identification of holes in a wireless sensor network is of primary interest since the breakdown of sensor nodes in a larger area often indicates one of the special events to ...
Stefan Funke