Sciweavers

4642 search results - page 428 / 929
» Distributed algorithm and reversible network
Sort
View
COLCOM
2008
IEEE
15 years 11 months ago
Security through Collaboration in MANETs
It is well understood that Mobile Ad Hoc Networks (MANETs) are extremely susceptible to a variety of attacks, and traditional security mechanisms do not work well. Many security sc...
Wenjia Li, James Parker, Anupam Joshi
ESOA
2006
15 years 8 months ago
Dynamic Decentralized Any-Time Hierarchical Clustering
Hierarchical clustering is used widely to organize data and search for patterns. Previous algorithms assume that the body of data being clustered is fixed while the algorithm runs...
H. Van Dyke Parunak, Richard Rohwer, Theodore C. B...
BTW
2009
Springer
127views Database» more  BTW 2009»
15 years 11 months ago
In-Network Detection of Anomaly Regions in Sensor Networks with Obstacles
: In the past couple of years, sensor networks have evolved to a powerful infrastructure component for monitoring and tracking events and phenomena in many application domains. An ...
Conny Franke, Marcel Karnstedt, Daniel Klan, Micha...
RTSS
2009
IEEE
15 years 11 months ago
Towards Stable Network Performance in Wireless Sensor Networks
Abstract—Many applications in wireless sensor networks require communication performance that is both consistent and high quality. Unfortunately, performance of current network p...
Shan Lin, Gang Zhou, Kamin Whitehouse, Yafeng Wu, ...
ALGOSENSORS
2004
Springer
15 years 10 months ago
Constrained Flow Optimization with Applications to Data Gathering in Sensor Networks
We focus on data gathering problems in energy-constrained wireless sensor networks. We study store-and-gather problems where data are locally stored on the sensors before the data ...
Bo Hong, Viktor K. Prasanna