Sciweavers

1986 search results - page 251 / 398
» constraints 2006
Sort
View
IJAHUC
2006
128views more  IJAHUC 2006»
13 years 8 months ago
Avoid 'void' in geographic routing for data aggregation in sensor networks
: Wireless sensor networks have attracted great attention in research and industrial development due to its fast-growing application potentials. New techniques must be developed fo...
Shigang Chen, Guangbin Fan, Jun-Hong Cui
IJCV
2006
94views more  IJCV 2006»
13 years 8 months ago
Four Points in Two or Three Calibrated Views: Theory and Practice
Suppose two perspective views of four world points are given and that the intrinsic parameters are known but the camera poses and the world point positions are not. We prove that t...
David Nistér, Frederik Schaffalitzky
IJSN
2006
93views more  IJSN 2006»
13 years 8 months ago
Limiting DoS attacks during multihop data delivery in wireless sensor networks
: Denial of Service (DoS) attacks can be easily launched in Wireless Sensor Networks (WSNs). Due to their resource constraints, namely limited energy, memory and bandwidth, WSNs ar...
Jing Deng, Richard Han, Shivakant Mishra
IJSNET
2006
170views more  IJSNET 2006»
13 years 8 months ago
Ordinal MDS-based localisation for wireless sensor networks
: There are various applications in wireless sensor networks which require knowing the relative or actual position of the sensor nodes. Over the past few years, there have been dif...
Vijayanth Vivekanandan, Vincent W. S. Wong
IJWET
2006
89views more  IJWET 2006»
13 years 8 months ago
Enforcing web services business protocols at run-time: a process-driven approach
: Business processes provide abstractions for modelling business protocols that define the correct interactions between two or more Web services (WS). It has been shown that it is ...
Biörn Biörnstad, Cesare Pautasso, Gustav...