Sciweavers

944 search results - page 56 / 189
» A Survey on Counting Networks
Sort
View
IJSNET
2007
91views more  IJSNET 2007»
14 years 11 months ago
SUMP: a secure unicast messaging protocol for wireless ad hoc sensor networks
: Most wireless ad hoc sensor networks are susceptible to routing level attacks, in which an adversary masquerades as a legitimate node to convince neighbouring nodes that it is th...
Jeff Janies, Chin-Tser Huang, Nathan L. Johnson, T...
ICC
2008
IEEE
141views Communications» more  ICC 2008»
15 years 6 months ago
Greedy Hop Distance Routing Using Tree Recovery on Wireless Ad Hoc and Sensor Networks
—Connectivity-based routing protocols use the hop count vector to a group of anchors for packet forwarding. Due to the discrete nature of hop count based coordinates, without an ...
Shao Tao, Akkihebbal L. Ananda, Mun Choon Chan
MDM
2009
Springer
299views Communications» more  MDM 2009»
15 years 6 months ago
Aggregate Location Monitoring for Wireless Sensor Networks: A Histogram-Based Approach
Location monitoring systems are used to detect human activities and provide monitoring services, e.g., aggregate queries. In this paper, we consider an aggregate location monitori...
Chi-Yin Chow, Mohamed F. Mokbel, Tian He
ICWSM
2010
15 years 1 months ago
Comparing Information Diffusion Structure in Weblogs and Microblogs
To better understand and characterize the emerging social medium of microblogging we conducted a comparison between Twitter and a weblog network for their respective information d...
Jiang Yang, Scott Counts
FPGA
1997
ACM
124views FPGA» more  FPGA 1997»
15 years 4 months ago
A FPGA-Based Implementation of a Fault-Tolerant Neural Architecture for Photon Identification
Event identification in photon counting ICCD detectors requires a high level image analysis which cannot be easily described algorithmically: neural networks are promising to appr...
Monica Alderighi, E. L. Gummati, Vincenzo Piuri, G...