Sciweavers

2715 search results - page 220 / 543
» Network bucket testing
Sort
View
JCM
2006
118views more  JCM 2006»
15 years 21 days ago
Joint Optimization of Local and Fusion Rules in a Decentralized Sensor Network
Decentralized sensor networks are collections of individual local sensors that observe a common phenomenon, quantize their observations, and send this quantized information to a ce...
Nithya Gnanapandithan, Balasubramaniam Natarajan
102
Voted
JOIN
2006
113views more  JOIN 2006»
15 years 21 days ago
Local Detection of Selfish Routing Behavior in Ad Hoc Networks
Reputation mechanisms for detecting and punishing free-riders in ad hoc networks depend on the local detection of selfish behavior. Although naive selfish strategies based on drop...
Bo Wang 0001, Sohraab Soltani, Jonathan K. Shapiro...
120
Voted
SIGMETRICS
2008
ACM
111views Hardware» more  SIGMETRICS 2008»
15 years 20 days ago
Predicting the resource consumption of network intrusion detection systems
Abstract. When installing network intrusion detection systems (NIDSs), operators are faced with a large number of parameters and analysis options for tuning trade-offs between dete...
Holger Dreger, Anja Feldmann, Vern Paxson, Robin S...
CCE
2005
15 years 19 days ago
New rigorous one-step MILP formulation for heat exchanger network synthesis
In this paper, a rigorous MILP formulation for grass-root design of heat exchanger networks is developed. The methodology does not rely on traditional supertargeting followed by n...
Andrés F. Barbaro, Miguel J. Bagajewicz
104
Voted
TWC
2008
172views more  TWC 2008»
15 years 18 days ago
A Software-Defined Radio System for Backscatter Sensor Networks
Backscatter radio is proposed for sensor networks. In that way, the transmitter for each sensor is simplified to a transistor connected to an antenna and therefore, the cost for ea...
Giovanni Vannucci, Aggelos Bletsas, Darren Leigh