Sciweavers

53302 search results - page 10296 / 10661
» On the design of a
Sort
View
ADHOC
2007
109views more  ADHOC 2007»
15 years 1 months ago
Access control in wireless sensor networks
Nodes in a sensor network may be lost due to power exhaustion or malicious attacks. To extend the lifetime of the sensor network, new node deployment is necessary. In military sce...
Yun Zhou, Yanchao Zhang, Yuguang Fang
AES
2008
Springer
182views Cryptology» more  AES 2008»
15 years 1 months ago
Logical product models for automated scripting of process-level construction animations
Animation can add significant value to Discrete-Event Simulation by helping verify, validate, and accredit simulation analyses. This is particularly true in construction where typ...
Vineet R. Kamat
ADHOC
2007
118views more  ADHOC 2007»
15 years 1 months ago
Sticky CSMA/CA: Implicit synchronization and real-time QoS in mesh networks
We propose a novel approach to QoS for real-time traffic over wireless mesh networks, in which application layer characteristics are exploited or shaped in the design of medium ac...
Sumit Singh, Prashanth Aravinda Kumar Acharya, Upa...
AES
2008
Springer
133views Cryptology» more  AES 2008»
15 years 1 months ago
Alternative neural networks to estimate the scour below spillways
Artificial neural networks (ANN's) are associated with difficulties like lack of success in a given problem and unpredictable level of accuracy that could be achieved. In eve...
H. Md. Azamathulla, M. C. Deo, P. B. Deolalikar
130
Voted
AGIS
2008
319views more  AGIS 2008»
15 years 1 months ago
An Efficient Algorithm for Raster-to-Vector Data Conversion
Data conversion from raster to vector (R2V) is a key function in Geographic Information Systems (GIS) and remote sensing (RS) image processing for integrating GIS and RS data. The...
Junhua Teng, Fahui Wang, Yu Liu
« Prev « First page 10296 / 10661 Last » Next »