Sciweavers

1639 search results - page 242 / 328
» Degree-constrained network flows
Sort
View
77
Voted
DMSN
2006
ACM
15 years 4 months ago
Efficient handling of sensor failures
Sensors provide unprecedented access to a wealth of information from the physical environment in real-time. However, they suffer from a variety of resource limitations, most impor...
Andreea Berfield, Panos K. Chrysanthis, Alexandros...
ECUMN
2007
Springer
15 years 2 months ago
Towards Sensor Integration into Multimedia Applications
Since few years, several applications are proposed on mobile devices. However, these applications are not aware of their physical environment. The emergence of wireless sensors, a...
Christine Louberry, Philippe Roose, Marc Dalmau
91
Voted
CIIT
2004
127views Communications» more  CIIT 2004»
15 years 2 months ago
OLSIM: Up-to-date traffic information on the web
The Internet is a convenient platform to distribute real time traffic information. Thus, we propose a web-based visualization of the current and future traffic load of the entire ...
Andreas Pottmeier, Roland Chrobok, Sigurdur F. Haf...
128
Voted
CIIT
2004
131views Communications» more  CIIT 2004»
15 years 2 months ago
Effectiveness of rate-limiting in mitigating flooding DOS attacks
This paper investigates the effectiveness of rate-limiting in mitigating TCP-based flooding Denial of Service (DoS) attacks. Rate-limiting is used as a DoS defense mechanism to di...
Jarmo Mölsä
ICWN
2003
15 years 2 months ago
The Effect of Disengaging RTS/CTS Dialogue in IEEE 802.11 MAC Protocol
In this paper, we study the effect of using or disengaging the RTS/CTS dialogue in IEEE 802.11 DCF MAC protocol incorporating the realistic condition under which carrier sensing, ...
Laura Huei-jiun Ju, Izhak Rubin