Sciweavers

5699 search results - page 1058 / 1140
» Applications of Wireless Sensor Networks
Sort
View
SRDS
1999
IEEE
15 years 2 months ago
An Adaptive Checkpointing Protocol to Bound Recovery Time with Message Logging
Numerous mathematical approaches have been proposed to determine the optimal checkpoint interval for minimizing total execution time of an application in the presence of failures....
Kuo-Feng Ssu, Bin Yao, W. Kent Fuchs
COMPSEC
2006
97views more  COMPSEC 2006»
14 years 10 months ago
Towards a location-based mandatory access control model
With the growing use of wireless networks and mobile devices, we are moving towards an era where location information will be necessary for access control. The use of location inf...
Indrakshi Ray, Mahendra Kumar
IJNSEC
2007
253views more  IJNSEC 2007»
14 years 9 months ago
Stream or Block Cipher for Securing VoIP?
When the network is homogeneous, choosing the cipher type for a packet telephony application is simple. It is clear that stream ciphers perform better than block ciphers over land...
Ashraf D. Elbayoumy, Simon J. Shepherd
ISCC
2002
IEEE
120views Communications» more  ISCC 2002»
15 years 2 months ago
UMTS-TDD: a solution for internetworking Bluetooth piconets in indoor environments
–– The last few years have seen the evolution of telecommunications from the classic architectures, mainly based on static and wired structures, to the new mobile solutions bas...
Mario Gerla, Yeng-Zhong Lee, Rohit Kapoor, Ted Tae...
CDC
2008
IEEE
137views Control Systems» more  CDC 2008»
15 years 4 months ago
Increasingly correct message passing averaging algorithms
Abstract— We study averaging algorithms, when implemented in large networks of wirelessly connected elements. We extend the notion of “Increasing Correctness” (IC) which was ...
Kurt Plarre, Francesco Bullo
« Prev « First page 1058 / 1140 Last » Next »