Sciweavers

7778 search results - page 1347 / 1556
» Designing Controllers for Reachability
Sort
View
COMPUTER
2007
123views more  COMPUTER 2007»
15 years 3 months ago
Cryptography on a Speck of Dust
Ubiquitous computing has become a reality in recent years. Tiny wireless sensors and RFID tags are being deployed today and will soon form an important aspect of our infrastructur...
Jens-Peter Kaps, Gunnar Gaubatz, Berk Sunar
COR
2007
106views more  COR 2007»
15 years 3 months ago
Scheduling parallel CNC machines with time/cost trade-off considerations
When the processing times of jobs are controllable, selected processing times affect both the manufacturing cost and the scheduling performance.A well-known example for such a cas...
Sinan Gurel, M. Selim Akturk
JCM
2008
196views more  JCM 2008»
15 years 3 months ago
An Energy Optimization Protocol Based on Cross-Layer for Wireless Sensor Networks
Survivability is one of the critical issues and the most important research topics in the fields of wireless sensor networks (WSNs). Energy efficiency is one of the determining fac...
Yuebin Bai, Shujuan Liu, Mo Sha, Yang Lu, Cong Xu
155
Voted
JCP
2008
206views more  JCP 2008»
15 years 3 months ago
SW-R2P: A Trusted Small World Overlay P2P Network with Zero Knowledge Identification
In order to implement both the efficiency and security in the Peer-to-Peer (P2P) network, we design a trusted small world overlay P2P network with the role based and reputation bas...
Yingjie Xia, Guanghua Song, Yao Zheng
JCST
2008
144views more  JCST 2008»
15 years 3 months ago
Beacon-Less Geographic Routing in Real Wireless Sensor Networks
Geographic Routing (GR) algorithms, require nodes to periodically transmit HELLO messages to allow neighbors know their positions (beaconing mechanism). Beacon-less routing algorit...
Juan A. Sánchez, Rafael Marín-P&eacu...
« Prev « First page 1347 / 1556 Last » Next »