Sciweavers

10995 search results - page 2097 / 2199
» Positioning
Sort
View
CN
2007
91views more  CN 2007»
13 years 9 months ago
Improving the quality of alerts and predicting intruder's next goal with Hidden Colored Petri-Net
Intrusion detection systems (IDS) often provide poor quality alerts, which are insufficient to support rapid identification of ongoing attacks or predict an intruder’s next lik...
Dong Yu, Deborah A. Frincke
CN
2007
141views more  CN 2007»
13 years 9 months ago
Identifying lossy links in wired/wireless networks by exploiting sparse characteristics
In this paper, we consider the problem of estimating link loss rates based on end-to-end path loss rates in order to identify lossy links on the network. We first derive a maximu...
Hyuk Lim, Jennifer C. Hou
CN
2007
129views more  CN 2007»
13 years 9 months ago
Performance evaluation of MAC transmission power control in wireless sensor networks
In this paper we provide a method to analytically compute the energy saving provided by the use of transmission power control (TPC) at the MAC layer in wireless sensor networks (W...
Javier Vales-Alonso, Esteban Egea-López, Al...
CN
2007
114views more  CN 2007»
13 years 9 months ago
BiSNET: A biologically-inspired middleware architecture for self-managing wireless sensor networks
This paper describes BiSNET (Biologically-inspired architecture for Sensor NETworks), a middleware architecture that addresses several key issues in multi-modal wireless sensor ne...
Pruet Boonma, Junichi Suzuki
IOR
2008
89views more  IOR 2008»
13 years 9 months ago
Impulse Control of Brownian Motion: The Constrained Average Cost Case
When a manufacturer places repeated orders with a supplier to meet changing production requirements, he faces the challenge of finding the right balance between holding costs and ...
Melda Ormeci, J. G. Dai, John H. Vande Vate
« Prev « First page 2097 / 2199 Last » Next »