Sciweavers

1184 search results - page 54 / 237
» Connecting Sensor Networks with TCP IP Network
Sort
View
MINENET
2005
ACM
15 years 3 months ago
ACAS: automated construction of application signatures
An accurate mapping of traffic to applications is important for a broad range of network management and measurement tasks. Internet applications have traditionally been identifi...
Patrick Haffner, Subhabrata Sen, Oliver Spatscheck...
GEOINFORMATICA
2011
14 years 4 months ago
Qualitative change detection using sensor networks based on connectivity information
The research reported in this paper uses wireless sensor networks to provide salient information about spatially distributed dynamic fields, such as regional variations in tempera...
Jixiang Jiang, Michael F. Worboys, Silvia Nittel
HOTI
2005
IEEE
15 years 3 months ago
SIFT: Snort Intrusion Filter for TCP
Intrusion rule processing in reconfigurable hardware enables intrusion detection and prevention services to run at multi Gigabit/second rates. High-level intrusion rules mapped d...
Michael Attig, John W. Lockwood
BERTINORO
2005
Springer
15 years 3 months ago
Power-Aware Distributed Protocol for a Connectivity Problem in Wireless Sensor Networks
We consider the problem of assigning transmission powers to the nodes of a wireless network in such a way that all the nodes are connected by bidirectional links and the total powe...
Roberto Montemanni, Luca Maria Gambardella
COMSWARE
2007
IEEE
15 years 4 months ago
Smaller Connected Dominating Sets in Ad Hoc and Sensor Networks based on Coverage by Two-Hop Neighbors
— In this paper, we focus on the construction of an efficient dominating set in ad hoc and sensor networks. A set of nodes is said to be dominating if each node is either itself...
François Ingelrest, David Simplot-Ryl, Ivan...