Sciweavers

7504 search results - page 1170 / 1501
» Computing with Action Potentials
Sort
View
ICSE
2007
IEEE-ACM
16 years 5 months ago
Path-Sensitive Inference of Function Precedence Protocols
Function precedence protocols define ordering relations among function calls in a program. In some instances, precedence protocols are well-understood (e.g., a call to pthread mut...
Murali Krishna Ramanathan, Ananth Grama, Suresh Ja...
PERCOM
2007
ACM
16 years 4 months ago
Analytical modeling and mitigation techniques for the energy hole problem in sensor networks
In this paper we investigate the problem of uneven energy consumptions in a large class of many-to-one sensor networks. In a many-to-one sensor network, all sensor nodes generate ...
Jian Li, Prasant Mohapatra
PERCOM
2007
ACM
16 years 4 months ago
SMOCK: A Self-Contained Public Key Management Scheme for Mission-Critical Wireless Ad Hoc Networks
Mobile ad hoc networks show great potential in emergency response and/or recovery. Such mission-critical applications demand security service be "anywhere", "anytim...
Wenbo He, Ying Huang, Klara Nahrstedt, Whay Chiou ...
PERCOM
2007
ACM
16 years 4 months ago
Making Radio Frequency Identification Visible - A Watchdog Tag
To address the privacy concerns associated with RFID, previous work proposed an approach, where RFID readers do not only broadcast commands to inventory tag populations, but also ...
Christian Metzger, Christian Floerkemeier, Philipp...
PERCOM
2007
ACM
16 years 4 months ago
Exploring Non Uniform Quality of Service for Extending WSN Lifetime
Interest in extracting and exploiting information from wireless sensor networks has been increasing for several years. Most scenarios focus on collecting and evaluating large amoun...
Anna Egorova-Forster, Amy L. Murphy
« Prev « First page 1170 / 1501 Last » Next »