Sciweavers

8080 search results - page 1514 / 1616
» From Computer Networks to Agent Networks
Sort
View
143
Voted
COMCOM
2008
91views more  COMCOM 2008»
15 years 3 months ago
A WEP post-processing algorithm for a Robust 802.11 WLAN implementation
Wired Equivalent Privacy (WEP) protocol used within the IEEE 802.11 standard has "major security flaws" thus wireless local area networks (WLANs) using the protocol are ...
Taskin Koçak, Mohit Jagetia
134
Voted
CORR
2010
Springer
148views Education» more  CORR 2010»
15 years 3 months ago
Data Sharing Options for Scientific Workflows on Amazon EC2
Efficient data management is a key component in achieving good performance for scientific workflows in distributed environments. Workflow applications typically communicate data be...
Gideon Juve, Ewa Deelman, Karan Vahi, Gaurang Meht...
118
Voted
CORR
2008
Springer
105views Education» more  CORR 2008»
15 years 3 months ago
Integrating OPC Data into GSN Infrastructures
This paper presents the design and the implementation of an interface software component between OLE for Process Control (OPC) formatted data and the Global ...
Olivier Passalacqua, Eric Benoit, Marc-Philippe Hu...
229
Voted
AUTOMATICA
2006
140views more  AUTOMATICA 2006»
15 years 3 months ago
On a stochastic sensor selection algorithm with applications in sensor scheduling and sensor coverage
In this note we consider the following problem. Suppose a set of sensors is jointly trying to estimate a process. One sensor takes a measurement at every time step and the measure...
Vijay Gupta, Timothy H. Chung, Babak Hassibi, Rich...
120
Voted
GEOINFORMATICA
2006
116views more  GEOINFORMATICA 2006»
15 years 3 months ago
The Radial Topology Algorithm - A New Approach for Deriving 2.5D GIS Data Models
In this paper a new method for the combination of 2D GIS vector data and 2.5D DTM represented by triangulated irregular networks (TIN) to derive integrated triangular 2.5D object-b...
Ulrich Lenk, Christian Heipke
« Prev « First page 1514 / 1616 Last » Next »