Sciweavers

1266 search results - page 68 / 254
» Threat Evaluation Method for Distributed Network Environment
Sort
View
ICDCS
2010
IEEE
15 years 6 months ago
Distributed Coverage in Wireless Ad Hoc and Sensor Networks by Topological Graph Approaches
Abstract—Coverage problem is a fundamental issue in wireless ad hoc and sensor networks. Previous techniques for coverage scheduling often require accurate location information o...
Dezun Dong, Yunhao Liu, Kebin Liu, Xiangke Liao
124
Voted
ICC
2007
IEEE
107views Communications» more  ICC 2007»
15 years 10 months ago
Evaluation of Security for DSSS Under Repeater Jamming
—Direct sequence spread spectrum (DSSS) technique has been widely used in both military communications and commercial communications. On the other hand, it is a challenge to both...
Hang Wang, Jingbo Guo, Zanji Wang
122
Voted
JSSPP
2001
Springer
15 years 8 months ago
Coscheduling under Memory Constraints in a NOW Environment
Networks of Workstations (NOW) have become important and cost-effective parallel platforms for scientific computations. In practice, a NOW system is heterogeneous and non-dedicat...
Francesc Giné, Francesc Solsona, Porfidio H...
ICC
2009
IEEE
120views Communications» more  ICC 2009»
15 years 11 months ago
Back-of-the-Envelope Computation of Throughput Distributions in CSMA Wireless Networks
— This paper presents a simple method for computing throughputs of links in a CSMA network. We call our method back-of-the-envelop (BoE) computation, because for many network con...
Soung Chang Liew, Caihong Kai, Jason Leung, Bill W...
134
Voted
JIFS
2007
102views more  JIFS 2007»
15 years 4 months ago
Knowledge propagation in a distributed omnidirectional vision system
In this paper an omnidirectional Distributed Vision System (DVS) is presented. The presented DVS is able to learn to navigate a mobile robot in its working environment without any...
Emanuele Menegatti, C. Simionato, Stefano Tonello,...