Sciweavers

11927 search results - page 2139 / 2386
» Wireless Sensor Networks
Sort
View
136
Voted
ACSAC
2007
IEEE
15 years 9 months ago
Countering False Accusations and Collusion in the Detection of In-Band Wormholes
Cooperative intrusion detection techniques for MANETs utilize ordinary computing hosts as network intrusion sensors. If compromised, these hosts may inject bogus data into the int...
Daniel Sterne, Geoffrey Lawler, Richard Gopaul, Br...
MOBIQUITOUS
2007
IEEE
15 years 8 months ago
Assessing Standard and Inverted Skip Graphs Using Multi-Dimensional Range Queries and Mobile Nodes
—The skip graph, an application-layer data structure for routing and indexing, may be used in a sensor network to facilitate queries of the distributed k-dimensional data collect...
Gregory J. Brault, Christopher J. Augeri, Barry E....
142
Voted
IEEEICCI
2005
IEEE
15 years 8 months ago
A brain-like computer for cognitive software applications: the Ersatz Brain project
We want to design a suitable computer for the efficient execution of the software now being developed that will display human-like cognitive abilities. Examples of these potential...
J. A. Anderson
132
Voted
IPPS
2005
IEEE
15 years 8 months ago
Distributed Data Streams Indexing using Content-Based Routing Paradigm
In recent years, we have seen a dramatic increase in the use of data-centric distributed systems such as global grid infrastructures, sensor networks, network monitoring, and vari...
Ahmet Bulut, Ambuj K. Singh, Roman Vitenberg
MSN
2005
Springer
15 years 8 months ago
An Overlapping Communication Protocol Using Improved Time-Slot Leasing for Bluetooth WPANs
Abstract. In this paper, we propose an overlapping communication protocol using improved time-slot leasing in the Bluetooth WPANS. One or many slave-master-slave communications usu...
Yuh-Shyan Chen, Yun-Wei Lin, Chih-Yung Chang
« Prev « First page 2139 / 2386 Last » Next »