Sciweavers

1022 search results - page 68 / 205
» Challenges for Constraint Programming in Networking
Sort
View
CONEXT
2008
ACM
15 years 2 months ago
ALPHA: an adaptive and lightweight protocol for hop-by-hop authentication
Wireless multi-hop networks are particularly susceptible to attacks based on flooding and the interception, tampering with, and forging of packets. Thus, reliable communication in...
Tobias Heer, Stefan Götz, Oscar García...
136
Voted
SP
2008
IEEE
159views Security Privacy» more  SP 2008»
15 years 15 days ago
Inferring neuronal network connectivity from spike data: A temporal data mining approach
Abstract. Understanding the functioning of a neural system in terms of its underlying circuitry is an important problem in neuroscience. Recent developments in electrophysiology an...
Debprakash Patnaik, P. S. Sastry, K. P. Unnikrishn...
93
Voted
PERCOM
2007
ACM
16 years 5 days ago
Ontology-Directed Generation of Frameworks for Pervasive Service Development
Pervasive computing applications are tedious to develop because they combine a number of problems ranging from device heterogeneity, to middleware constraints, to lack of programm...
Charles Consel, Wilfried Jouve, Julien Lancia, Nic...
97
Voted
JNW
2008
116views more  JNW 2008»
15 years 17 days ago
The Tiny Agent - Wireless Sensor Networks Controlling Energy Resources
CSIRO is using wireless sensor network technology to deploy "tiny agents", working as autonomous controllers for individual pieces of electrical load/generation equipment...
Glenn Platt, Joshua Wall, Philip Valencia, John K....
SIGMOD
2006
ACM
170views Database» more  SIGMOD 2006»
16 years 22 days ago
Energy-efficient monitoring of extreme values in sensor networks
Monitoring extreme values (MAX or MIN) is a fundamental problem in wireless sensor networks (and in general, complex dynamic systems). This problem presents very different algorit...
Adam Silberstein, Jun Yang 0001, Kamesh Munagala