Sciweavers

SUTC
2006
IEEE
14 years 5 months ago
A Novel Realistic Simulation Tool for Video Transmission over Wireless Network
Chih-Heng Ke, Cheng-Han Lin, Ce-Kuen Shieh, Wen-Sh...
SUTC
2006
IEEE
14 years 5 months ago
Detecting the Direction of Motion in a Binary Sensor Network
We examine the problem of detecting the direction of motion in a binary sensor network; in such a network each sensor’s value is supplied reliably in a single bit of information...
Panagiotis Karras, Nikos Mamoulis
SUTC
2006
IEEE
14 years 5 months ago
An Indoor Localization Mechanism Using Active RFID Tag
The location-aware technology and its application are prerequisite to realize the ubiquitous computing. However, another special system for indoor localization is needed in the co...
Guang-yao Jin, Xiao-Yi Lu, Myong-Soon Park
SUTC
2006
IEEE
14 years 5 months ago
The Computational Complexity of Enforceability Validation for Generic Access Control Rules
In computer security, many researches have tackled on the possibility of a unified model of access control, which could enforce any access control policies within a single unified...
Vincent C. Hu, D. Richard Kuhn, David F. Ferraiolo
SUTC
2006
IEEE
14 years 5 months ago
Self-organization Strategies for Dynamic Context Coverage in Capability-Constrained Mobile Sensor Networks
We propose and formally characterize a new problem named the dynamic context coverage problem in capabilityconstrained mobile sensor network environments. The goal is to move and ...
Shiow-yang Wu, Chao-Hong Liu, Chen-Kuang Tzeng
SUTC
2006
IEEE
14 years 5 months ago
Towards Embedded Wireless-Networked Intelligent Daylighting Systems for Commercial Buildings
Energy efficient office lighting systems can save 40% in electricity consumption in areas that receive significant amounts of daylight. In spite of the savings they can generate, ...
Yao-Jung Wen, Jessica Granderson, Alice M. Agogino
SUTC
2006
IEEE
14 years 5 months ago
Detection and Repair of Software Errors in Hierarchical Sensor Networks
Abstract— Sensor networks are being increasingly deployed for collecting critical data in various applications. Once deployed, a sensor network may experience faults at the indiv...
Douglas Herbert, Yung-Hsiang Lu, Saurabh Bagchi, Z...
SUTC
2006
IEEE
14 years 5 months ago
Native API Based Windows Anomaly Intrusion Detection Method Using SVM
While many researches of Host Anomaly Detection System using system calls under UNIX/UNIX-like systems have been done but little in Windows systems, we do the similar research und...
Miao Wang, Cheng Zhang, Jingjing Yu
SUTC
2006
IEEE
14 years 5 months ago
DynamicTrust: The Trust Development in Peer-to-Peer Environments
In peer-to-peer (P2P) environments, trust is a very important issue when transactions/interactions occur between peers. In general, the trust evaluation on transactions/interactio...
Yang Wang, Vijay Viradharajan