Sciweavers

1320 search results - page 49 / 264
» Constraint Based Network Adaptation for Ubiquitous Applicati...
Sort
View
CONEXT
2008
ACM
15 years 2 months ago
ALPHA: an adaptive and lightweight protocol for hop-by-hop authentication
Wireless multi-hop networks are particularly susceptible to attacks based on flooding and the interception, tampering with, and forging of packets. Thus, reliable communication in...
Tobias Heer, Stefan Götz, Oscar García...
ICDM
2009
IEEE
137views Data Mining» more  ICDM 2009»
14 years 10 months ago
Argumentation Based Constraint Acquisition
Efficient acquisition of constraint networks is a key factor for the applicability of constraint problem solving methods. Current techniques ease knowledge acquisition by generati...
Kostyantyn M. Shchekotykhin, Gerhard Friedrich
ICDCSW
2009
IEEE
15 years 7 months ago
Joint Sleep Scheduling and Mode Assignment in Wireless Cyber-Physical Systems
Designing cyber-physical systems with high efficiency, adaptability, autonomy, reliability and usability is a challenging task. In this paper, we focus on minimizing networkwide ...
Chun Jason Xue, Guoliang Xing, Zhaohui Yuan, Zili ...
84
Voted
PERCOM
2003
ACM
16 years 5 days ago
Dynamic Application Composition: Customizing the Behavior of an Active Space
The proliferation of wireless networks, hand-held PCs, touch panels, large flat displays, sensors, and embedded devices is transforming traditional habitats and living spaces into...
Brian Ziebart, Manuel Román, Roy H. Campbel...
92
Voted
TPDS
2008
176views more  TPDS 2008»
15 years 14 days ago
Adaptive Data Collection Strategies for Lifetime-Constrained Wireless Sensor Networks
Communication is a primary source of energy consumption in wireless sensor networks. Due to resource constraints, the sensor nodes may not have enough energy to report every readin...
Xueyan Tang, Jianliang Xu