Sciweavers

14783 search results - page 2917 / 2957
» Quantum Information Processing
Sort
View
IVS
2008
145views more  IVS 2008»
13 years 10 months ago
Towards a taxonomy of movement patterns
A review of research that has been carried out on data mining and visual analysis of movement patterns suggests that there is little agreement on the relevant types of movement pa...
Somayeh Dodge, Robert Weibel, Anna-Katharina Laute...
IJNSEC
2006
132views more  IJNSEC 2006»
13 years 10 months ago
Alert Correlation for Extracting Attack Strategies
Alert correlation is an important technique for managing large the volume of intrusion alerts that are raised by heterogenous Intrusion Detection Systems (IDSs). The recent trend ...
Bin Zhu, Ali A. Ghorbani
JCIT
2008
138views more  JCIT 2008»
13 years 10 months ago
Enhancing the Routing Performance of Wireless Sensor Networks using Connected Dominating Sets
Many prominent applications in wireless sensor networks require collected information has to be routed to end nodes in an efficient manner. In general, Connected Dominating Set (C...
B. Paramasivan, Mohaideen Pitchai, Radha Krishnan
CORR
2007
Springer
121views Education» more  CORR 2007»
13 years 10 months ago
Power-Efficient Direct-Voting Assurance for Data Fusion in Wireless Sensor Networks
—Wireless sensor networks place sensors into an area to collect data and send them back to a base station. Data fusion, in which collected data are fused before they are sent to ...
Hung-Ta Pai, Yunghsiang S. Han
INFORMATICALT
2006
88views more  INFORMATICALT 2006»
13 years 10 months ago
Improving the Performances of Asynchronous Algorithms by Combining the Nogood Processors with the Nogood Learning Techniques
Abstract. The asynchronous techniques that exist within the programming with distributed constraints are characterized by the occurrence of the nogood values during the search for ...
Ionel Muscalagiu, Vladimir Cretu
« Prev « First page 2917 / 2957 Last » Next »