Sciweavers

2349 search results - page 159 / 470
» Performing time-sensitive network experiments
Sort
View
COMCOM
2004
102views more  COMCOM 2004»
15 years 3 months ago
The distinctive design characteristic of a wireless sensor network: the energy map
The key challenge in the design of a wireless sensor network is maximizing its lifetime. This is a fundamental problem and new protocol engineering principles need to be establish...
Raquel A. F. Mini, Antonio Alfredo Ferreira Lourei...
SIGMETRICS
2002
ACM
115views Hardware» more  SIGMETRICS 2002»
15 years 3 months ago
Maximum likelihood network topology identification from edge-based unicast measurements
Network tomography is a process for inferring "internal" link-level delay and loss performance information based on end-to-end (edge) network measurements. These methods...
Mark Coates, Rui Castro, Robert Nowak, Manik Gadhi...
SIGIR
2003
ACM
15 years 9 months ago
Automatic ranking of retrieval systems in imperfect environments
The empirical investigation of the effectiveness of information retrieval (IR) systems requires a test collection, a set of query topics, and a set of relevance judgments made by ...
Rabia Nuray, Fazli Can
SMC
2010
IEEE
158views Control Systems» more  SMC 2010»
15 years 1 months ago
A study of genetic algorithms for approximating the longest path in generic graphs
Abstract--Finding the longest simple path in a generic undirected graph is a challenging issue that belongs to the NPComplete class of problems. Four approaches based on genetic al...
David Portugal, Carlos Henggeler Antunes, Rui Roch...
USS
2010
15 years 1 months ago
AdJail: Practical Enforcement of Confidentiality and Integrity Policies on Web Advertisements
Web publishers frequently integrate third-party advertisements into web pages that also contain sensitive publisher data and end-user personal data. This practice exposes sensitiv...
Mike Ter Louw, Karthik Thotta Ganesh, V. N. Venkat...