Sciweavers

933 search results - page 121 / 187
» Extending Forward Checking
Sort
View
146
Voted
MSWIM
2005
ACM
15 years 8 months ago
Randomized energy aware routing algorithms in mobile ad hoc networks
We consider the problem of energy aware localized routing in ad hoc networks. In localized routing algorithms, each node forwards a message based on the position information about...
Israat Tanzeena Haque, Chadi Assi, J. William Atwo...
JCP
2008
116views more  JCP 2008»
15 years 2 months ago
Sensor Location Strategy in Large-Scale Systems for Fault Detection Applications
Fault detection in large-scale systems is conducted by the use of sensors, thus the sensor location influences the performances of fault detection directly. As the scale of systems...
Fan Yang, Deyun Xiao
148
Voted
SECON
2010
IEEE
15 years 13 days ago
Back-Tracking Based Sensor Deployment by a Robot Team
Existing solutions to carrier-based sensor placement by a single robot, in a bounded unknown region of interest (ROI), do not guarantee full area coverage and/or do not terminate. ...
Greg Fletcher, Xu Li, Amiya Nayak, Ivan Stojmenovi...
ADHOC
2010
135views more  ADHOC 2010»
14 years 9 months ago
Efficient broadcast for wireless ad hoc networks with a realistic physical layer
In this paper, we investigate the low coverage problem of efficient broadcast protocols in wireless ad hoc networks with realistic physical layer models. To minimize energy consum...
Hui Xu, J. J. Garcia-Luna-Aceves
131
Voted
SIGSOFT
2005
ACM
16 years 3 months ago
Reasoning about confidentiality at requirements engineering time
Growing attention is being paid to application security at requirements engineering time. Confidentiality is a particular subclass of security concerns that requires sensitive inf...
Renaud De Landtsheer, Axel van Lamsweerde