Sciweavers

2507 search results - page 277 / 502
» Wireless Network Information Flow
Sort
View
138
Voted
CORR
2010
Springer
132views Education» more  CORR 2010»
15 years 28 days ago
New Frontiers of Network Security: The Threat Within
Nearly 70% of information security threats originate from inside the organization. The instances of insider threats have been increasing at an alarming rate with the latest trends ...
Sugata Sanyal, Ajit Shelat, Amit Gupta
133
Voted
ISN
1999
Springer
159views Communications» more  ISN 1999»
15 years 7 months ago
Accounting Management in a TINA-Based Service and Network Environment
The ACTS FlowThru project aims to build a management system which supports the flow of management information across organisational and technological domains by reusing components ...
Patrick Hellemans, Cliff Redmond, Koen Daenen, Dav...
140
Voted
SAC
2003
ACM
15 years 8 months ago
TinyGALS: A Programming Model for Event-Driven Embedded Systems
Networked embedded systems such as wireless sensor networks are usually designed to be event-driven so that they are reactive and power efficient. Programming embedded systems wit...
Elaine Cheong, Judith Liebman, Jie Liu, Feng Zhao
144
Voted
ADHOC
2010
173views more  ADHOC 2010»
15 years 8 days ago
A new distributed topology control algorithm for wireless environments with non-uniform path loss and multipath propagation
Each node in a wireless multi-hop network can adjust the power level at which it transmits and thus change the topology of the network to save energy by choosing the neighbors wit...
Harish Sethu, Thomas Gerety
123
Voted
MOBISYS
2005
ACM
16 years 3 months ago
WALRUS: wireless acoustic location with room-level resolution using ultrasound
In this paper, we propose a system that uses the wireless networking and microphone interfaces of mobile devices to determine location to room-level accuracy. The wireless network...
Gaetano Borriello, Alan L. Liu, Tony Offer, Christ...