Sciweavers

1266 search results - page 187 / 254
» Threat Evaluation Method for Distributed Network Environment
Sort
View

Publication
331views
17 years 3 months ago
On Accurate and Efficient Statistical Counting in Sensor-Based Surveillance Systems
Sensor networks have been used in many surveillance systems, providing statistical information about monitored areas. Accurate counting information (e.g., the distribution of the ...
Shuo Guo, Tian He, Mohamed F. Mokbel, John A. Stan...
MOBIHOC
2006
ACM
15 years 10 months ago
Wakeup scheduling in wireless sensor networks
A large number of practical sensing and actuating applications require immediate notification of rare but urgent events and also fast delivery of time sensitive actuation command...
Abtin Keshavarzian, Huang Lee, Lakshmi Venkatraman
INFOCOM
2006
IEEE
15 years 10 months ago
Sleeping Coordination for Comprehensive Sensing Using Isotonic Regression and Domatic Partitions
— We address the problem of energy efficient sensing by adaptively coordinating the sleep schedules of sensor nodes while guaranteeing that values of sleeping nodes can be recov...
Farinaz Koushanfar, Nina Taft, Miodrag Potkonjak
DSN
2009
IEEE
15 years 10 months ago
Stretching gossip with live streaming
Gossip-based information dissemination protocols are considered easy to deploy, scalable and resilient to network dynamics. They are also considered highly flexible, namely tunab...
Davide Frey, Rachid Guerraoui, Anne-Marie Kermarre...
JNCA
2006
92views more  JNCA 2006»
15 years 3 months ago
Cards-to-presentation on the web: generating multimedia contents featuring agent animations
With the goal of supporting the knowledge circulation and creation process in a society, we have studied story-based communication in a network community. On the basis of this res...
Yukiko I. Nakano, Toshihiro Murayama, Masashi Okam...