Sciweavers

12562 search results - page 2413 / 2513
» Distributed Xbean Applications
Sort
View
JSAC
2007
93views more  JSAC 2007»
14 years 9 months ago
Eviction of Misbehaving and Faulty Nodes in Vehicular Networks
— Vehicular Networks (VNs) are emerging, among civilian applications, as a convincing instantiation of the mobile networking technology. However, security is a critical factor an...
Maxim Raya, Panagiotis Papadimitratos, Imad Aad, D...
JSW
2007
185views more  JSW 2007»
14 years 9 months ago
A Decision Support System base line Flexible Architecture to Intrusion Detection
—Becoming more competitive and more effective in the current scenes of Business and Public Administration, the organizations must be able to approach easily and quickly to the in...
Marcello Castellano, Giuseppe Mastronardi, Angela ...
TVLSI
2008
133views more  TVLSI 2008»
14 years 9 months ago
Test Data Compression Using Selective Encoding of Scan Slices
We present a selective encoding method that reduces test data volume and test application time for scan testing of Intellectual Property (IP) cores. This method encodes the slices ...
Zhanglei Wang, Krishnendu Chakrabarty
TWC
2008
156views more  TWC 2008»
14 years 9 months ago
Secure and Fault-Tolerant Event Boundary Detection in Wireless Sensor Networks
Event boundary detection is in and of itself a useful application in wireless sensor networks (WSNs). Typically, it includes the detection of a large-scale spatial phenomenon such ...
Kui Ren, Kai Zeng, Wenjing Lou
TWC
2008
129views more  TWC 2008»
14 years 9 months ago
Amplify-and-forward cooperation under interference-limited spatial reuse of the relay slot
1 . Cooperative transmission has emerged as an effective tool to deal with channel impairments. In this work we study the applicability of amplify-and-forward cooperative transmiss...
Adrian Agustin, Josep Vidal
« Prev « First page 2413 / 2513 Last » Next »