Sciweavers

1266 search results - page 166 / 254
» Threat Evaluation Method for Distributed Network Environment
Sort
View
ADHOC
2007
104views more  ADHOC 2007»
15 years 4 months ago
An overlay approach to data security in ad-hoc networks
While it has been argued that application-layer overlay protocols can enhance services in mobile ad-hoc networks, hardly any empirical data is available on the throughput and dela...
Jörg Liebeherr, Guangyu Dong
PERCOM
2005
ACM
16 years 3 months ago
Energy Efficient Differentiable Coverage Service Protocols for Wireless Sensor Networks
This paper considers the problem of maintaining the coverage degree of a wireless sensor network at an application specific level while keeping the sensing units of only a subset o...
Hasan Çam, Hidayet Ozgur Sanli
134
Voted
PPAM
2007
Springer
15 years 10 months ago
Empowering Automatic Semantic Annotation in Grid
Nowadays, capturing the knowledge in ontological structures is one of the primary focuses of the semantic web research. To exploit the knowledge from the vast quantity of existing ...
Michal Laclavik, Marek Ciglan, Martin Seleng, Ladi...
PDCN
2004
15 years 5 months ago
Quality-of-service provisioning system for multimedia transmission in IEEE 802.11 wireless lans
IEEE 802.11, the standard of wireless local area networks (WLANs), allows the coexistence of asynchronous and time-bounded traffic using the distributed coordination function (DCF)...
Joseph Deng, Hsu-Chun Yen
GECCO
2009
Springer
153views Optimization» more  GECCO 2009»
15 years 8 months ago
An evaporation mechanism for dynamic and noisy multimodal optimization
Dealing with imprecise information is a common characteristic in real-world problems. Specifically, when the source of the information are physical sensors, a level of noise in t...
Jose Luis Fernandez-Marquez, Josep Lluís Ar...