Sciweavers

946 search results - page 134 / 190
» Customer-Driven Sensor Management
Sort
View
SUTC
2006
IEEE
15 years 4 months ago
An Authentication Service Based on Trust and Clustering in Wireless Ad Hoc Networks: Description and Security Evaluation
Security in wireless ad hoc networks is hard to achieve due to the vulnerability of its links, limited physical protection, and the absence of a centralized management point. Cons...
Edith C. H. Ngai, Michael R. Lyu
GECCO
2005
Springer
220views Optimization» more  GECCO 2005»
15 years 3 months ago
Scale invariant pareto optimality: a meta--formalism for characterizing and modeling cooperativity in evolutionary systems
This article describes a mathematical framework for characterizing cooperativity in complex systems subject to evolutionary pressures. This framework uses three foundational compo...
Mark Fleischer
SAINT
2002
IEEE
15 years 2 months ago
Ubiquitous Commerce - Always On, Always Aware, Always Pro-active
The development of the infrastructure for ubiquitous computing is progressing rapidly, yet the applications that will be built on this new infrastructure remain largely ill define...
Anatole Gershman
PERCOM
2010
ACM
14 years 8 months ago
Towards the Web of Things: Using DPWS to bridge isolated OSGi platforms
Abstract—Bringing heterogeneous devices like industrial machines, home appliances, and wireless sensors into the Web assumes the usage of well-defined standards and protocols. O...
Oliver Dohndorf, Jan Krüger, Heiko Krumm, Chr...
ICCAD
2010
IEEE
145views Hardware» more  ICCAD 2010»
14 years 8 months ago
Fuzzy control for enforcing energy efficiency in high-performance 3D systems
3D stacked circuits reduce communication delay in multicore system-on-chips (SoCs) and enable heterogeneous integration of cores, memories, sensors, and RF devices. However, vertic...
Mohamed M. Sabry, Ayse Kivilcim Coskun, David Atie...