Sciweavers

952 search results - page 49 / 191
» TreeFam: 2008 Update
Sort
View
138
Voted
CNSR
2008
IEEE
189views Communications» more  CNSR 2008»
15 years 10 months ago
Secure Health Monitoring Network against Denial-Of-Service Attacks Using Cognitive Intelligence
Secure and energy efficient transmission is a main concern in many wireless sensor network applications. In this paper, two types of denial-of-service attacks that affect the rout...
Rajani Muraleedharan, Lisa Ann Osadciw
130
Voted
CNSR
2008
IEEE
126views Communications» more  CNSR 2008»
15 years 10 months ago
An Orthogonal Projection Approach for Blind Beamforming in Multipath CDMA Channels
In this paper, we propose a blind beamforming technique for multipath CDMA channels, which requires prior knowledge of only the spreading code and the timing of the desired user. ...
Jianshu Chen, Jian Wang, Pengyu Zhang, Jian Yuan, ...
131
Voted
CNSR
2008
IEEE
136views Communications» more  CNSR 2008»
15 years 10 months ago
Using QR-Updating with Reduced Complexity for Precise Localization in Mobile Sensor Networks
Localizing tiny sensor nodes in large wireless sensor networks is extremely complex, due to the node’s strict resource limitations regarding memory size, processor performance a...
Frank Reichenbach, Dominik Lieckfeldt, Dirk Timmer...
CSMR
2008
IEEE
15 years 10 months ago
Hecataeus: A What-If Analysis Tool for Database Schema Evolution
Databases are continuously evolving environments, where design constructs are added, removed or updated rather often. Small changes in the database configurations might impact a l...
George Papastefanatos, Fotini Anagnostou, Yannis V...
170
Voted
CSSE
2008
IEEE
15 years 10 months ago
Web Services Composition Method Based on OWL
—At present, Web services are created and updated on the fly. It has already beyond the human ability to analysis them and generate the composition plan manually. It is a problem...
Jike Ge, Yuhui Qiu, Shiqun Yin