Sciweavers

2341 search results - page 332 / 469
» Using ontologies for simulation integration
Sort
View
CNSR
2007
IEEE
124views Communications» more  CNSR 2007»
14 years 4 months ago
Evaluation Framework of Location Privacy of Wireless Mobile Systems with Arbitrary Beam Pattern
Position localization of transmitters can be carried out by an adversary owning a network of pervasive receivers, which can pinpoint the victim mobile nodes’ locations with high...
Ford-Long Wong, Min Lin, Shishir Nagaraja, Ian J. ...
ADAEUROPE
2007
Springer
14 years 4 months ago
Towards User-Level Extensibility of an Ada Library: An Experiment with Cheddar
In this article, we experiment a way to extend an Ada library called Cheddar. Cheddar provides a domain specific language. Programs written with this domain specific language can...
Frank Singhoff, Alain Plantec
ISCC
2006
IEEE
14 years 4 months ago
Layered Multicast Data Origin Authentication and Non-repudiation over Lossy Networks
— Security and QoS are two main issues for a successful wide deployment of multicast services. For instance, in a multicast streaming application, a receiver would require a data...
Yoann Hinard, Hatem Bettahar, Yacine Challal, Abde...
HICSS
2005
IEEE
185views Biometrics» more  HICSS 2005»
14 years 3 months ago
HEAR-SN: A New Hierarchical Energy-Aware Routing Protocol for Sensor Networks
Wireless sensor networks are becoming an integral part of numerous applications very quickly. Here, we present a new approach for sensor applications that requires coverage for a ...
Michael Hempel, Hamid Sharif, Prasad Raviraj
ICNP
2005
IEEE
14 years 3 months ago
Trading Precision for Stability in Congestion Control with Probabilistic Packet Marking
In pricing-based congestion control protocols it is common to assume that the rate of congestion feedback from the network is limited to a single bit per packet. To obtain a preci...
Jonathan K. Shapiro, C. V. Hollot, Donald F. Towsl...