Sciweavers

229 search results - page 44 / 46
» A Distributed Greedy Algorithm for Connected Sensor Cover in...
Sort
View
IDEAS
2008
IEEE
256views Database» more  IDEAS 2008»
14 years 5 days ago
WIDS: a sensor-based online mining wireless intrusion detection system
This paper proposes WIDS, a wireless intrusion detection system, which applies data mining clustering technique to wireless network data captured through hardware sensors for purp...
Christie I. Ezeife, Maxwell Ejelike, Akshai K. Agg...
ICRA
2009
IEEE
185views Robotics» more  ICRA 2009»
14 years 12 days ago
Ad-hoc wireless network coverage with networked robots that cannot localize
— We study a fully distributed, reactive algorithm for deployment and maintenance of a mobile communication backbone that provides an area around a network gateway with wireless ...
Nikolaus Correll, Jonathan Bachrach, Daniel Vicker...
GPC
2009
Springer
13 years 9 months ago
Balanced Scheduling Algorithm Considering Availability in Mobile Grid
The emerging Grid is extending the scope of resources to mobile devices and sensors that are connected through unreliable networks. Nowadays the number of mobile device users is in...
JongHyuk Lee, SungJin Song, JoonMin Gil, KwangSik ...
HASE
2008
IEEE
14 years 6 days ago
Power Optimization in Fault-Tolerant Mobile Ad Hoc Networks
—In this paper, we investigate the transmission-power assignment problem for k-connected mobile ad hoc networks (MANETs), the problem of optimizing the lifetime of a MANET at a g...
Oliviero Riganelli, Radu Grosu, Samir R. Das, C. R...
CONCUR
2009
Springer
14 years 10 days ago
Query-Based Model Checking of Ad Hoc Network Protocols
Abstract. A prominent source of complexity in the verification of ad hoc network (AHN) protocols is the fact that the number of network topologies grows exponentially with the squ...
Anu Singh, C. R. Ramakrishnan, Scott A. Smolka