Sciweavers

530 search results - page 89 / 106
» Performance Analysis of DECK Collective Communication Servic...
Sort
View
TWC
2008
156views more  TWC 2008»
15 years 3 months ago
Secure and Fault-Tolerant Event Boundary Detection in Wireless Sensor Networks
Event boundary detection is in and of itself a useful application in wireless sensor networks (WSNs). Typically, it includes the detection of a large-scale spatial phenomenon such ...
Kui Ren, Kai Zeng, Wenjing Lou
118
Voted
TSE
2002
98views more  TSE 2002»
15 years 3 months ago
Measurement Programs in Software Development: Determinants of Success
Measurement programs in software organizations are an important source of control over quality and cost in software development. The findings of this research presented here are ba...
Anandasivam Gopal, Mayuram S. Krishnan, Tridas Muk...
124
Voted
GLOBECOM
2009
IEEE
15 years 10 months ago
Evaluating DoS Attacks against Sip-Based VoIP Systems
Abstract—The multimedia communication is rapidly converging towards Voice over Internet – commonly known as Voice over Internet Protocol (VoIP). Session Initiation Protocol (SI...
M. Zubair Rafique, M. Ali Akbar, Muddassar Farooq
156
Voted
INFOCOM
2003
IEEE
15 years 8 months ago
Exploring the trade-off between label size and stack depth in MPLS Routing
— Multiprotocol Label Switching or MPLS technology is being increasingly deployed by several of the largest Internet service providers to solve problems such as traffic engineer...
Anupam Gupta, Amit Kumar, Rajeev Rastogi
185
Voted
MOBIHOC
2005
ACM
16 years 3 months ago
Power balanced coverage-time optimization for clustered wireless sensor networks
We consider a wireless sensor network in which sensors are grouped into clusters, each with its own cluster head (CH). Each CH collects data from sensors in its cluster and relays...
Tao Shu, Marwan Krunz, Sarma B. K. Vrudhula