Sciweavers

537 search results - page 22 / 108
» Buy-at-Bulk Network Design with Protection
Sort
View
SOUPS
2005
ACM
15 years 4 months ago
Attacking information visualization system usability overloading and deceiving the human
Information visualization is an effective way to easily comprehend large amounts of data. For such systems to be truly effective, the information visualization designer must be aw...
Gregory J. Conti, Mustaque Ahamad, John T. Stasko
ICDCS
2008
IEEE
15 years 5 months ago
Hotness-Aware Sensor Networks
In a realistic sensor network, in particular with a nonuniform deployment, sensor nodes inevitably have varying workloads. This causes a natural problem that some sensor nodes are...
Dong Li, Yanmin Zhu, Li Cui, Lionel M. Ni
WWIC
2004
Springer
197views Communications» more  WWIC 2004»
15 years 4 months ago
Context-Aware Group Communication in Mobile Ad-Hoc Networks
Abstract. The widespread availability of both fixed and wireless network connectivity and the growing market of portable devices are enabling anytime and anywhere impromptu collabo...
Dario Bottazzi, Antonio Corradi, Rebecca Montanari
COMSWARE
2007
IEEE
15 years 5 months ago
Survivable Routing in WDM Weighted Networks
: In this paper, we investigate the problem of routing lightpaths on an arbitrary physical topology following a Design Protection approach, such that virtual topology remains conne...
Debasis Mandal, Satyajit Nath, Bivas Mitra
WS
2004
ACM
15 years 4 months ago
Security considerations for IEEE 802.15.4 networks
The IEEE 802.15.4 specification outlines a new class of wireless radios and protocols targeted at low power devices, personal area networks, and sensor nodes. The specification ...
Naveen Sastry, David Wagner