Sciweavers

3483 search results - page 196 / 697
» Forward
Sort
View
CORR
2010
Springer
153views Education» more  CORR 2010»
15 years 4 months ago
Secured Greedy Perimeter Stateless Routing for Wireless Sensor Networks
Wireless sensor networks are collections of large number of sensor nodes. The sensor nodes are featured with limited energy, computation and transmission power. Each node in the n...
P. Samundiswary, D. Sathian, P. Dananjayan
ENVSOFT
2008
115views more  ENVSOFT 2008»
15 years 4 months ago
Adaptive fuzzy modeling versus artificial neural networks
In this paper two areas of soft computing (fuzzy modeling and artificial neural networks) are discussed. Based on the fundamental mathematical similarity of fuzzy technique and ra...
Ralf Wieland, Wilfried Mirschel
CCR
2006
92views more  CCR 2006»
15 years 4 months ago
Flow labelled IP over ATM: design and rationale
We describe a system in which layer 2 switching is placed directly under the control of layer 3 routing protocols on a hop-by-hop basis. Specifically, ATM switching is controlled ...
Greg Minshall, Robert M. Hinden, Eric Hoffman, Fon...
CN
2006
74views more  CN 2006»
15 years 4 months ago
OMNI: An efficient overlay multicast infrastructure for real-time applications
We consider an overlay architecture (called OMNI) where service providers deploy a set of service nodes (called MSNs) in the network to efficiently implement media-streaming appli...
Suman Banerjee, Christopher Kommareddy, Koushik Ka...
COMCOM
2006
100views more  COMCOM 2006»
15 years 4 months ago
A secure alternate path routing in sensor networks
This paper presents a secure alternate path routing in sensor networks. Our alternate path scheme makes the routing protocol resilient in the presence of malicious nodes that laun...
Suk-Bok Lee, Yoon-Hwa Choi