Sciweavers

1266 search results - page 164 / 254
» Threat Evaluation Method for Distributed Network Environment
Sort
View
USENIX
1996
15 years 5 months ago
Transparent Fault Tolerance for Parallel Applications on Networks of Workstations
This paper describes a new method for providingtransparent fault tolerance for parallel applications on a network of workstations. We have designed our method in the context of sh...
Daniel J. Scales, Monica S. Lam
SIP
2007
15 years 5 months ago
Geometrically robust image watermarking using star patterns
Digital copyright protection has become increasingly important in recent times due to the rapid growth of the Internet and the proliferation of P2P technologies. Copyright protect...
J. R. Zhang, Jon G. Rokne
SAC
2010
ACM
15 years 11 months ago
A wavelet-based sampling algorithm for wireless sensor networks applications
This work proposes and evaluates a sampling algorithm based on wavelet transforms with Coiflets basis to reduce the data sensed in wireless sensor networks applications. The Coiï...
André L. L. de Aquino, Ricardo A. R. Olivei...
WINET
2011
14 years 11 months ago
Sleep scheduling with expected common coverage in wireless sensor networks
Sleep scheduling, which is putting some sensor nodes into sleep mode without harming network functionality, is a common method to reduce energy consumption in dense wireless sensor...
Eyuphan Bulut, Ibrahim Korpeoglu
ADHOCNOW
2009
Springer
15 years 1 months ago
A Decentralized Approach to Minimum-Energy Broadcasting in Static Ad Hoc Networks
Broadcasting is a commonly used feature in wireless networking, e.g. for file distribution, re-tasking, event notification, or miscellaneous maintenance. Due to the limited resourc...
Christopher Miller, Christian Poellabauer