Sciweavers

569 search results - page 111 / 114
» Using Constraints for Exploring Catalogs
Sort
View
CP
2005
Springer
14 years 28 days ago
Search and Inference in AI Planning
While Planning has been a key area in Artificial Intelligence since its beginnings, significant changes have occurred in the last decade as a result of new ideas and a more estab...
Hector Geffner
SENSYS
2004
ACM
14 years 27 days ago
TinySec: a link layer security architecture for wireless sensor networks
We introduce TinySec, the first fully-implemented link layer security architecture for wireless sensor networks. In our design, we leverage recent lessons learned from design vul...
Chris Karlof, Naveen Sastry, David Wagner
ICDCSW
2003
IEEE
14 years 23 days ago
Foundations of Security for Hash Chains in Ad Hoc Networks
Nodes in ad hoc networks generally transmit data at regular intervals over long periods of time. Recently, ad hoc network nodes have been built that run on little power and have v...
Phillip G. Bradford, Olga V. Gavrylyako
SENSYS
2003
ACM
14 years 21 days ago
Matching data dissemination algorithms to application requirements
A distinguishing characteristic of wireless sensor networks is the opportunity to exploit characteristics of the application at lower layers. This approach is encouraged by device...
John S. Heidemann, Fabio Silva, Deborah Estrin
SIGGRAPH
1999
ACM
13 years 11 months ago
Creating a Live Broadcast from a Virtual Environment
“Inhabited Television” combines multiuser virtual environments with television, so that online audience-members can participate in TV shows staged in a virtual world. It is pr...
Chris Greenhalgh, John Bowers, Graham Walker, John...