Sciweavers

2691 search results - page 456 / 539
» Security in Ad Hoc Networks
Sort
View
IEEEARES
2008
IEEE
14 years 4 months ago
A Bayesian Approach for on-Line Max Auditing
In this paper we propose a method for on-line max auditing of dynamic statistical databases. The method extends the Bayesian approach presented in [2], [3] and [4] for static data...
Gerardo Canfora, Bice Cavallo
ISORC
2007
IEEE
14 years 4 months ago
Data Dissemination for Wireless Sensor Networks
Due to the special characteristics (limited battery power, limited computing capability, low bandwidth, need to collect sensor data from multiple fixed-location source nodes to a...
Min-Gu Lee, Sunggu Lee
AINA
2006
IEEE
14 years 4 months ago
Application Programming Interface for Configuration of Multi-Robot Sensor Networks
In this paper we propose a design of Application Programming Interfaces (APIs) for configuration of Multi-Robot Sensor Networks (MRSNs). Such networks have unique aspects: intenti...
Junya Yamashita, Ryohei Suzuki, Kei Sawai, Hiroki ...
NOMS
2006
IEEE
119views Communications» more  NOMS 2006»
14 years 4 months ago
Runtime Semantic Interoperability for Gathering Ontology-based Network Context
—The trends for pushing more operational intelligence towards network elements to achieve more context-aware and self-managing behavior often requires elements to gather network ...
John Keeney, David Lewis, Declan O'Sullivan, Antoi...
SUTC
2006
IEEE
14 years 4 months ago
TARANTULAS: Mobility-enhanced Wireless Sensor-Actuator Networks
Amidst the numerous active research efforts in wireless sensor networks which aim to push beyond the limits, we aim to significantly enhance the effectiveness of wireless sensors ...
Winston Khoon Guan Seah, Kevin Z. Liu, Marcelo H. ...