Sciweavers

1266 search results - page 216 / 254
» Threat Evaluation Method for Distributed Network Environment
Sort
View
ATAL
2010
Springer
13 years 9 months ago
MagneBike: toward multi climbing robots for power plant inspection
An ever-growing infrastructure, including existing and newly built power plants, as well as a rising environmental awareness in society call for inspection and maintenance systems...
Andreas Breitenmoser, Fabien Tâche, Gilles C...
TKDE
2010
164views more  TKDE 2010»
13 years 6 months ago
Defeasible Contextual Reasoning with Arguments in Ambient Intelligence
Abstract—The imperfect nature of context in Ambient Intelligence environments and the special characteristics of the entities that possess and share the available context informa...
Antonis Bikakis, Grigoris Antoniou
CORR
2008
Springer
119views Education» more  CORR 2008»
13 years 8 months ago
Self-stabilizing Numerical Iterative Computation
Many challenging tasks in sensor networks, including sensor calibration, ranking of nodes, monitoring, event region detection, collaborative filtering, collaborative signal proces...
Ezra N. Hoch, Danny Bickson, Danny Dolev
ADHOC
2008
103views more  ADHOC 2008»
13 years 8 months ago
Impact of sensor-enhanced mobility prediction on the design of energy-efficient localization
Energy efficiency and positional accuracy are often contradictive goals. We propose to decrease power consumption without sacrificing significant accuracy by developing an energy-...
Chuang-Wen You, Polly Huang, Hao-Hua Chu, Yi-Chao ...
SIGMETRICS
2012
ACM
248views Hardware» more  SIGMETRICS 2012»
11 years 11 months ago
Pricing cloud bandwidth reservations under demand uncertainty
In a public cloud, bandwidth is traditionally priced in a pay-asyou-go model. Reflecting the recent trend of augmenting cloud computing with bandwidth guarantees, we consider a n...
Di Niu, Chen Feng, Baochun Li