Sciweavers

759 search results - page 63 / 152
» Control Component Development of Information Appliances on N...
Sort
View
WISEC
2009
ACM
15 years 6 months ago
Securing network access in wireless sensor networks
In wireless sensor networks, it is critical to restrict the network access only to eligible sensor nodes, while messages from outsiders will not be forwarded in the networks. In t...
Kun Sun, An Liu, Roger Xu, Peng Ning, W. Douglas M...
CNSM
2010
14 years 10 months ago
MANET network management and performance monitoring for NHDP and OLSRv2
Abstract--Mobile Ad Hoc NETworks (MANETs) are generally thought of as infrastructureless and largely "un-managed" network deployments, capable of accommodating highly dyn...
Ulrich Herberg, Thomas Clausen, Robert Cole
JCS
2008
88views more  JCS 2008»
14 years 12 months ago
A privacy-aware access control system
The protection of privacy is an increasing concern in our networked society because of the growing amount of personal information that is being collected by a number of commercial...
Claudio Agostino Ardagna, Marco Cremonini, Sabrina...
CDC
2009
IEEE
166views Control Systems» more  CDC 2009»
15 years 4 months ago
Composite adaptation for neural network-based controllers
—With the motivation of using more information to update the parameter estimates to achieve improved tracking performance, composite adaptation that uses both the system tracking...
Parag M. Patre, Shubhendu Bhasin, Zachary D. Wilco...
GLOBECOM
2006
IEEE
15 years 6 months ago
Defending against Instant Messaging Worms
— Due to the real time nature and buddy list presence information of Instant Messaging (IM) systems worms can spread over IM networks rapidly, causing severe damages, however, it...
Zhijun Liu, Guoqiang Shu, Na Li, David Lee