Sciweavers

1763 search results - page 290 / 353
» Scientific Data Collections and Distributed Collective Pract...
Sort
View
109
Voted
MDM
2009
Springer
126views Communications» more  MDM 2009»
15 years 7 months ago
Outlier Detection in Ad Hoc Networks Using Dempster-Shafer Theory
Mobile Ad-hoc NETworks (MANETs) are known to be vulnerable to a variety of attacks due to lack of central authority or fixed network infrastructure. Many security schemes have bee...
Wenjia Li, Anupam Joshi
PPDP
2009
Springer
15 years 7 months ago
Path-sensitive region analysis for mercury programs
Dividing the heap memory of programs into regions is the starting point of region-based memory management. In our existing work of enabling region-based memory management for Merc...
Quan Phan, Gerda Janssens
102
Voted
QEST
2008
IEEE
15 years 7 months ago
KPC-Toolbox: Simple Yet Effective Trace Fitting Using Markovian Arrival Processes
We present the KPC-Toolbox, a collection of Matlab scripts for fitting workload traces into Markovian Arrival Processes (MAPs) in an automatic way. We first present detailed sen...
Giuliano Casale, Eddy Z. Zhang, Evgenia Smirni
CISS
2007
IEEE
15 years 6 months ago
Bounding A Statistical Measure Of Network Lifetime For Wireless Sensor Networks
—The inherent many-to-one flow of traffic in Wireless Sensor Networks produces a skewed distribution of energy consumption rates leading to the early demise of those sensors that...
Muhammad Usman Ilyas, Hayder Radha
90
Voted
GLOBECOM
2007
IEEE
15 years 6 months ago
The Design and Evaluation of a Wireless Sensor Network for Mine Safety Monitoring
– This paper describes a wireless sensor network for mine safety monitoring. Based on the characteristics of underground mine gallery and the requirements for mine safety monitor...
Xiaoguang Niu, Xi Huang, Ze Zhao, Yuhe Zhang, Chan...