Sciweavers

523 search results - page 66 / 105
» A simulation model for military deployment
Sort
View
125
Voted
DCOSS
2005
Springer
15 years 6 months ago
Analysis of Target Detection Performance for Wireless Sensor Networks
In surveillance and tracking applications, wireless sensor nodes collectively monitor the existence of intruding targets. In this paper, we derive closed form results for predicti...
Qing Cao, Ting Yan, John A. Stankovic, Tarek F. Ab...
PERVASIVE
2005
Springer
15 years 6 months ago
Parasitic Mobility for Pervasive Sensor Networks
Distributed sensor networks offer many new capabilities for contextually monitoring environments. By making such systems mobile, we increase the application-space for the distribut...
Mathew Laibowitz, Joseph A. Paradiso
97
Voted
INFOCOM
2000
IEEE
15 years 4 months ago
On the Aggregatability of Multicast Forwarding State
Abstract— It has been claimed that multicast state cannot be aggregated. In this paper, we will debunk this myth and present a simple technique that can be used to aggregate mult...
David Thaler, Mark Handley
IEEESCC
2010
IEEE
15 years 4 months ago
Analyzing Communities vs. Single Agent-Based Web Services: Trust Perspectives
—Gathering functionally similar agent-based Web services into communities has been proposed and promoted on many occasions. In this paper, we compare the performance of these com...
Babak Khosravifar, Jamal Bentahar, Ahmad Moazin, Z...
101
Voted
MASCOTS
2010
15 years 2 months ago
Predicting the Performance of Virtual Machine Migration
With the ability to move virtual machines between physical hosts, live migration is a core feature of virtualisation. However for migration to be useful, deployable feature on a la...
Sherif Akoush, Ripduman Sohan, Andrew Rice, Andrew...