Sciweavers

2814 search results - page 411 / 563
» Multicriteria Network Design Using Evolutionary Algorithm
Sort
View
NETWORK
2007
167views more  NETWORK 2007»
15 years 2 months ago
Sensor Localization under Limited Measurement Capabilities
If we abstract a sensor network as a network graph consisting of vertices and edges, where vertices represent sensor nodes and edges represent distance measurements between neighbo...
Chen Wang, Li Xiao
CHI
2005
ACM
16 years 3 months ago
Visualization in law enforcement
Visualization techniques have proven to be critical in helping crime analysis. By interviewing and observing Criminal Intelligence Officers (CIO) and civilian crime analysts at th...
Hsinchun Chen, Homa Atabakhsh, Chunju Tseng, Byron...
MOBIHOC
2006
ACM
16 years 2 months ago
Adaptive splitting protocols for RFID tag collision arbitration
Tag identification is an important tool in RFID systems with applications for monitoring and tracking. A RFID reader recognizes tags through communication over a shared wireless c...
Jihoon Myung, Wonjun Lee
MSWIM
2009
ACM
15 years 10 months ago
Socially conscious channel selection in 802.11 WLANs for coexistence in a non-cooperative environment
The increasing number of independent IEEE 802.11 WLANs owned and managed by autonomous users has led to increased interference, resulting in performance degradation and unfairness...
Joo Ghee Lim, Chun Tung Chou, Sanjay Jha
133
Voted
IWNAS
2008
IEEE
15 years 9 months ago
A Novel Embedded Accelerator for Online Detection of Shrew DDoS Attacks
∗ As one type of stealthy and hard-to-detect attack, lowrate TCP-targeted DDoS attack can seriously throttle the throughput of normal TCP flows for a long time without being noti...
Hao Chen, Yu Chen