Sciweavers

26 search results - page 3 / 6
» itng 2008
Sort
View
ITNG
2008
IEEE
13 years 11 months ago
Chord-Based Key Establishment Schemes for Sensor Networks
— Because of limited resources at sensor nodes, sensor networks typically adopt symmetric-key algorithms to provide security functions such as protecting communications between n...
Fan Zhang, Zhijie Jerry Shi, Bing Wang
ITNG
2008
IEEE
13 years 11 months ago
Overlapped Layers for Prolonging Network Lifetime in Multi-Hop Wireless Sensor Networks
In this paper, the bottleneck problem in PRMC-based wireless sensor networks is studied. This problem can be solved by overlapping neighboring layers. By this way, more cluster he...
Hongyan Wang, Mei Yang, Yingtao Jiang, Shupeng Wan...
ITNG
2008
IEEE
13 years 11 months ago
Structural Features for Recognizing Degraded Printed Gurmukhi Script
The performance of an OCR system depends upon printing quality of the input document. Many OCRs have been designed which correctly identify fine printed documents in Indian and ot...
Manish Kumar Jindal, Rajendra Kumar Sharma, Gurpre...
ITNG
2008
IEEE
13 years 11 months ago
Combinatorial Test Case Selection with Markovian Usage Models
A method of using Markov chain techniques for combinatorial test case selection is presented. The method can be used for statistical and coverage testing of many software programs...
Sergiy A. Vilkomir, W. Thomas Swain, Jesse H. Poor...
ITNG
2008
IEEE
13 years 11 months ago
Towards a Model Driven Autonomic Management System
— Distributed software environments are increasingly complex and difficult to manage, as they integrate various legacy software with specific management interfaces. Moreover, t...
Laurent Broto, Daniel Hagimont, Estella Annoni, Be...