Sciweavers

2485 search results - page 211 / 497
» A Communicating Tree Model for Generating Network Applicatio...
Sort
View
131
Voted
CCS
2001
ACM
15 years 8 months ago
The performance of public key-enabled kerberos authentication in mobile computing applications
Authenticating mobile computing users can require a significant amount of processing and communications resources— particularly when protocols based on public key encryption are...
Alan Harbitter, Daniel A. Menascé
SAC
2003
ACM
15 years 9 months ago
TinyGALS: A Programming Model for Event-Driven Embedded Systems
Networked embedded systems such as wireless sensor networks are usually designed to be event-driven so that they are reactive and power efficient. Programming embedded systems wit...
Elaine Cheong, Judith Liebman, Jie Liu, Feng Zhao
FGCN
2008
IEEE
144views Communications» more  FGCN 2008»
15 years 10 months ago
A Novel Approach for Infrastructure Deployment for VANET
In last decade intelligent transportation systems (ITS) and vehicular ad hoc network (VANET) became one of the most active and emerging fields of research. It is expected that thi...
Une Thoing Rosi, Chowdhury Sayeed Hyder, Tai-hoon ...
134
Voted
BMCBI
2008
96views more  BMCBI 2008»
15 years 4 months ago
Novel methodology for construction and pruning of quasi-median networks
Background: Visualising the evolutionary history of a set of sequences is a challenge for molecular phylogenetics. One approach is to use undirected graphs, such as median network...
Sarah C. Ayling, Terence A. Brown
SENSYS
2009
ACM
15 years 10 months ago
Experiences with a high-fidelity wireless building energy auditing network
We describe the design, deployment, and experience with a wireless sensor network for high-fidelity monitoring of electrical usage in buildings. A network of 38 mote-class AC met...
Xiaofan Jiang, Minh Van Ly, Jay Taneja, Prabal Dut...