Sciweavers

2488 search results - page 404 / 498
» Distributed Non-binary Constraints
Sort
View
SECON
2008
IEEE
15 years 11 months ago
Breath: A Self-Adapting Protocol for Wireless Sensor Networks in Control and Automation
—The novel cross-layer protocol Breath for wireless sensor networks is designed, implemented, and experimentally evaluated. The Breath protocol is based on randomized routing, MA...
Pan Gun Park, Carlo Fischione, Alvise Bonivento, K...
WCNC
2008
IEEE
15 years 11 months ago
Mitigation of the Propagation of Localization Error Using Multi-Hop Bounding
Abstract—In ad hoc position-location networks, location information is obtained through the sequential estimation of node locations. An unlocalized node can estimate its location...
R. Michael Buehrer, Swaroop Venkatesh, Tao Jia
CISS
2007
IEEE
15 years 11 months ago
Bounding A Statistical Measure Of Network Lifetime For Wireless Sensor Networks
—The inherent many-to-one flow of traffic in Wireless Sensor Networks produces a skewed distribution of energy consumption rates leading to the early demise of those sensors that...
Muhammad Usman Ilyas, Hayder Radha
COLCOM
2007
IEEE
15 years 11 months ago
Towards trust-aware access management for ad-hoc collaborations
—In an ad-hoc collaborative sharing environment, attribute-based access control provides a promising approach in defining authorization over shared resources based on users’ p...
Jing Jin, Gail-Joon Ahn, Mohamed Shehab, Hongxin H...
EDOC
2007
IEEE
15 years 11 months ago
Incorporating Security Behaviour into Business Models Using a Model Driven Approach
There has, in recent years, been growing interest in Model Driven Engineering (MDE), in which models are the primary design artifacts and transformations are applied to these mode...
Peter F. Linington, Pulitha Liyanagama