Sciweavers

2545 search results - page 212 / 509
» ARQ for Network Coding
Sort
View
SASN
2006
ACM
15 years 10 months ago
Diversify sensor nodes to improve resilience against node compromise
A great challenge in securing sensor networks is that sensor nodes can be physically compromised. Once a node is compromised, attackers can retrieve secret information (e.g. keys)...
Abdulrahman Alarifi, Wenliang Du
WAN
1998
Springer
15 years 8 months ago
Some Performance Studies in Exact Linear Algebra
We consider parallel algorithms for computing the Hermite normal form of matrices over Euclidean rings. We use standard types of reduction methods which are the basis of many algor...
George Havas, Clemens Wagner 0002
PERCOM
2008
ACM
16 years 3 months ago
Efficient Retargeting of Generated Device User-Interfaces
Many pervasive computing systems have been built for using mobile computers to interact with networked devices. To deploy a device's user-interface, several systems dynamical...
Olufisayo Omojokun, Prasun Dewan
IJON
2007
68views more  IJON 2007»
15 years 3 months ago
A self-organizing map of sigma-pi units
By frame of reference transformations, an input variable in one coordinate system is transformed into an output variable in a different coordinate system depending on another inpu...
Cornelius Weber, Stefan Wermter
IPSN
2005
Springer
15 years 9 months ago
Avrora: scalable sensor network simulation with precise timing
— Simulation can be an important step in the development of software for wireless sensor networks and has been the subject of intense research in the past decade. While most prev...
Ben Titzer, Daniel K. Lee, Jens Palsberg