Sciweavers

1080 search results - page 162 / 216
» Performance analysis of the CONFIDANT protocol
Sort
View
MTA
2011
336views Hardware» more  MTA 2011»
14 years 4 months ago
SCface - surveillance cameras face database
In this paper we describe a database of static images of human faces. Images were taken in uncontrolled indoor environment using five video surveillance cameras of various qualitie...
Mislav Grgic, Kresimir Delac, Sonja Grgic
TDSC
2011
14 years 4 months ago
A Policy Enforcing Mechanism for Trusted Ad Hoc Networks
To ensure fair and secure communication in Mobile Ad hoc Networks (MANETs), the applications running in these networks must be regulated by proper communication policies. However,...
Gang Xu, Cristian Borcea, Liviu Iftode
PDP
2011
IEEE
14 years 1 months ago
Transport Optimization in Peer-to-Peer Networks
Abstract—The peer-to-peer networking concept has revolutionized the cost structure of Internet data dissemination by making large scale content delivery with low server cost feas...
Konstantin Miller, Adam Wolisz
IPSN
2010
Springer
15 years 4 months ago
Covering space for in-network sensor data storage
For in-network storage schemes, one maps data, indexed in a logical space, to the distributed sensor locations. When the physical sensor network has an irregular shape and possibl...
Rik Sarkar, Wei Zeng, Jie Gao, Xianfeng David Gu
MSWIM
2003
ACM
15 years 3 months ago
Modeling multicast packet losses in wireless LANs
— The characteristics of wireless packet loss have been studied extensively. Most efforts focus on the temporal loss characteristics at individual stations. For multicast protoco...
Chiping Tang, Philip K. McKinley