Sciweavers

1017 search results - page 150 / 204
» Towards an Active Network Architecture
Sort
View
EWSPT
2003
Springer
14 years 3 months ago
Providing Highly Automated and Generic Means for Software Deployment Process
We present a new approach for the management and enactment of deployment process by a deployment processor ORYA (Open enviRonment to deploY Applications). ORYA aims to integrate te...
Vincent Lestideau, Noureddine Belkhatir
IJCNN
2000
IEEE
14 years 1 months ago
Unsupervised Classification of Complex Clusters in Networks of Spiking Neurons
For unsupervised clustering in a network of spiking neurons we develop a temporal encoding of continuously valued data to obtain arbitrary clustering capacity and precision with a...
Sander M. Bohte, Johannes A. La Poutré, Joo...
CCR
2006
154views more  CCR 2006»
13 years 10 months ago
Medium access control issues in sensor networks
Medium access control for wireless sensor networks has been a very active research area for the past couple of years. The sensor networks literature presents an alphabet soup of m...
Muneeb Ali, Umar Saif, Adam Dunkels, Thiemo Voigt,...
JDCTA
2010
125views more  JDCTA 2010»
13 years 4 months ago
Reliable Information Transmission: A Chaotic Sequence-Based Authentication Scheme for Radio Environment Maps Enabled Cognitive R
With the intent of efficient occupying under-utilized spectrum, radio environment map (REM) based cognitive radio (CR) networking is proposed to facilitate the distributed spectru...
Li Zhang, Guoxin Zheng
DAC
2008
ACM
13 years 11 months ago
Protecting bus-based hardware IP by secret sharing
Our work addresses protection of hardware IP at the mask level with the goal of preventing unauthorized manufacturing. The proposed protocol based on chip locking and activation i...
Jarrod A. Roy, Farinaz Koushanfar, Igor L. Markov