Sciweavers

450 search results - page 60 / 90
» Network intrusion investigation - Preparation and challenges
Sort
View
IPPS
2005
IEEE
15 years 3 months ago
Maximizing the Lifetime of Dominating Sets
We investigate the problem of maximizing the lifetime of wireless ad hoc and sensor networks. Being battery powered, nodes in such networks have to perform their intended task und...
Thomas Moscibroda, Roger Wattenhofer
HICSS
2003
IEEE
156views Biometrics» more  HICSS 2003»
15 years 3 months ago
Quality-of-Service-Oriented Media Access Control for Advanced Mobile Multimedia Satellite Systems
Satellite networks offer a number of desirable characteristics including wide area coverage, unique broadcast capabilities, the ability to communicate with hand-held devices, and ...
Petia Todorova, Alexander Markhasin
TMA
2012
Springer
254views Management» more  TMA 2012»
13 years 5 months ago
Steps towards the Extraction of Vehicular Mobility Patterns from 3G Signaling Data
Abstract. The signaling traffic of a cellular network is rich of information related to the movements of its devices across cell boundaries. Thus, passive monitoring of anonymized ...
Pierdomenico Fiadino, Danilo Valerio, Fabio Riccia...
ICANN
2009
Springer
15 years 4 months ago
Adaptive Feature Transformation for Image Data from Non-stationary Processes
Abstract. This paper introduces the application of the feature transformation approach proposed by Torkkola [1] to the domain of image processing. Thereto, we extended the approach...
Erik Schaffernicht, Volker Stephan, Horst-Michael ...
ROBIO
2006
IEEE
217views Robotics» more  ROBIO 2006»
15 years 3 months ago
Modular software architecture for teams of cooperating, heterogeneous robots
— For teams of cooperating autonomous lightweight robots with challenging dynamical locomotion properties a platform independent modular software architecture and platform indepe...
Martin Friedmann, Jutta Kiener, Sebastian Petters,...