Sciweavers

3730 search results - page 687 / 746
» Robust design of embedded systems
Sort
View
105
Voted
VTC
2008
IEEE
158views Communications» more  VTC 2008»
15 years 7 months ago
A Novel Load Balanced and Lifetime Maximization Routing Protocol in Wireless Sensor Networks
Abstract— Balancing energy consumption and prolonging network lifetime are open challenges in Wireless Sensor Networks. In this paper, we design a novel load balanced routing pro...
Chengjie Wu, Ruixi Yuan, Hongchao Zhou
96
Voted
ESCIENCE
2007
IEEE
15 years 7 months ago
A SLA-Oriented Management of Containers for Hosting Stateful Web Services
Service-Oriented Architectures provide integration of interoperability for independent and loosely coupled services. Web services and the associated new standards such as WSRF are...
Christoph Reich, Kris Bubendorfer, Matthias Banhol...
90
Voted
HICSS
2007
IEEE
100views Biometrics» more  HICSS 2007»
15 years 7 months ago
The Impact of the NSA Cyber Defense Exercise on the Curriculum at the Air Force Institute of Technology
This paper describes how the curriculum and course format at the Air Force Institute of Technology (AFIT) has evolved based on our experience with the highly-successful Cyber Defe...
Barry E. Mullins, Timothy H. Lacey, Robert F. Mill...
ICCV
2007
IEEE
15 years 7 months ago
PEYE: Toward a Visual Motion Based Perceptual Interface for Mobile Devices
We present the architecture and algorithm design of a visual motion based perceptual interface for mobile devices with cameras. In addition to motion vector, we use the term “vis...
Gang Hua, Ting-Yi Yang, Srinath Vasireddy
118
Voted
P2P
2007
IEEE
165views Communications» more  P2P 2007»
15 years 7 months ago
An Information-Theoretic Framework for Analyzing Leak of Privacy in Distributed Hash Tables
An important security issue in DHT-based structured overlay networks is to provide anonymity to the storage nodes. Compromised routing tables in those DHTs leak information about ...
Souvik Ray, Zhao Zhang