Sciweavers

4207 search results - page 732 / 842
» Adaptive control allocation
Sort
View
132
Voted
SASO
2007
IEEE
15 years 10 months ago
Improving ICE Service Selection in a P2P System using the Gradient Topology
Internet Connectivity Establishment (ICE) is becoming increasingly important for P2P systems on the open Internet, as it enables NAT-bound peers to provide accessible services. A ...
Jim Dowling, Jan Sacha, Seif Haridi
119
Voted
SCAM
2007
IEEE
15 years 10 months ago
Quality Assessment for Embedded SQL
—The access of information systems to underlying relational databases is commonly programmed using embedded SQL queries. Such embedded queries may take the form of string literal...
Huib van den Brink, Rob van der Leek, Joost Visser
137
Voted
SECON
2007
IEEE
15 years 10 months ago
A Framework for Resilient Online Coverage in Sensor Networks
—We consider surveillance applications in which sensors are deployed in large numbers to improve coverage fidelity. Previous research has studied how to select active sensor cov...
Ossama Younis, Marwan Krunz, Srinivasan Ramasubram...
142
Voted
VTC
2007
IEEE
159views Communications» more  VTC 2007»
15 years 10 months ago
Data Fragmentation Scheme in IEEE 802.15.4 Wireless Sensor Networks
— The IEEE 802.15.4 Medium Access Control (MAC) protocol is designed for low data rate, short distance and low power communication applications such as Wireless Sensor Networks (...
Jongwon Yoon, Hyogon Kim, Jeong-Gil Ko
131
Voted
FROCOS
2007
Springer
15 years 10 months ago
Termination of Innermost Context-Sensitive Rewriting Using Dependency Pairs
Abstract. Innermost context-sensitive rewriting has been proved useful for modeling computations of programs of algebraic languages like Maude, OBJ, etc. Furthermore, innermost ter...
Beatriz Alarcón, Salvador Lucas