Sciweavers

2349 search results - page 159 / 470
» Performing time-sensitive network experiments
Sort
View
92
Voted
COMCOM
2004
102views more  COMCOM 2004»
14 years 10 months ago
The distinctive design characteristic of a wireless sensor network: the energy map
The key challenge in the design of a wireless sensor network is maximizing its lifetime. This is a fundamental problem and new protocol engineering principles need to be establish...
Raquel A. F. Mini, Antonio Alfredo Ferreira Lourei...
SIGMETRICS
2002
ACM
115views Hardware» more  SIGMETRICS 2002»
14 years 10 months ago
Maximum likelihood network topology identification from edge-based unicast measurements
Network tomography is a process for inferring "internal" link-level delay and loss performance information based on end-to-end (edge) network measurements. These methods...
Mark Coates, Rui Castro, Robert Nowak, Manik Gadhi...
SIGIR
2003
ACM
15 years 3 months ago
Automatic ranking of retrieval systems in imperfect environments
The empirical investigation of the effectiveness of information retrieval (IR) systems requires a test collection, a set of query topics, and a set of relevance judgments made by ...
Rabia Nuray, Fazli Can
124
Voted
SMC
2010
IEEE
158views Control Systems» more  SMC 2010»
14 years 8 months ago
A study of genetic algorithms for approximating the longest path in generic graphs
Abstract--Finding the longest simple path in a generic undirected graph is a challenging issue that belongs to the NPComplete class of problems. Four approaches based on genetic al...
David Portugal, Carlos Henggeler Antunes, Rui Roch...
90
Voted
USS
2010
14 years 8 months ago
AdJail: Practical Enforcement of Confidentiality and Integrity Policies on Web Advertisements
Web publishers frequently integrate third-party advertisements into web pages that also contain sensitive publisher data and end-user personal data. This practice exposes sensitiv...
Mike Ter Louw, Karthik Thotta Ganesh, V. N. Venkat...