Sciweavers

1275 search results - page 142 / 255
» Communication Network Analysis of the Enterprise Grid System...
Sort
View
IJSN
2008
145views more  IJSN 2008»
14 years 10 months ago
Clique-based group key assignment in Wireless Sensor Networks
: Security has become the corner stone of research in wireless sensor networks (WSNs). Due to the unique operational environment of WSNs, where the communication medium is open to ...
Avinash Srinivasan, Feng Li, Jie Wu, Minglu Li
CODES
2003
IEEE
15 years 3 months ago
A modular simulation framework for architectural exploration of on-chip interconnection networks
Ever increasing complexity and heterogeneity of SoC platforms require diversified on-chip communication schemes beyond the currently omnipresent shared bus architectures. To prev...
Tim Kogel, Malte Doerper, Andreas Wieferink, Raine...
INFOCOM
2009
IEEE
15 years 4 months ago
VISA: Virtual Scanning Algorithm for Dynamic Protection of Road Networks
—This paper proposes a VIrtual Scanning Algorithm (VISA), tailored and optimized for road network surveillance. Our design uniquely leverages upon the facts that (i) the movement...
Jaehoon Jeong, Yu Gu, Tian He, David Du
CDC
2010
IEEE
100views Control Systems» more  CDC 2010»
14 years 5 months ago
Impulsive systems triggered by superposed renewal processes
We consider impulsive systems with several reset maps triggered by independent renewal processes, i.e., the intervals between jumps associated with a given reset map are identicall...
Duarte Antunes, João Pedro Hespanha, Carlos...
INFOCOM
2010
IEEE
14 years 8 months ago
Delay-Based Network Utility Maximization
—It is well known that max-weight policies based on a queue backlog index can be used to stabilize stochastic networks, and that similar stability results hold if a delay index i...
Michael J. Neely