Sciweavers

1748 search results - page 32 / 350
» Security Models for Heterogeneous Networking
Sort
View
IEICET
2008
121views more  IEICET 2008»
15 years 3 months ago
Multi-Constrained QoS Geographic Routing for Heterogeneous Traffic in Sensor Networks
Sensor nodes report the sensed data packets to the sink and depending on the application these packets may have diverse attributes: time-critical (TC) and non time-critical (NTC). ...
Md. Abdur Razzaque, Muhammad Mahbub Alam, Md. Mamu...
WSDM
2012
ACM
296views Data Mining» more  WSDM 2012»
13 years 10 months ago
Inferring social ties across heterogenous networks
It is well known that different types of social ties have essentially different influence between people. However, users in online social networks rarely categorize their contact...
Jie Tang, Tiancheng Lou, Jon M. Kleinberg
IPSN
2007
Springer
15 years 9 months ago
Probabilistic detection of mobile targets in heterogeneous sensor networks
Target detection and field surveillance are among the most prominent applications of Sensor Networks (SN). The quality of detection achieved by a SN can be quantified by evaluat...
Loukas Lazos, Radha Poovendran, James A. Ritcey
EOR
2008
59views more  EOR 2008»
15 years 3 months ago
Spectrum planning and performance evaluation between heterogeneous satellite networks
A new network has been recently proposed for the provision of fixed broadband services via high altitude platform stations (HAPS) in the 48/47 GHz band. One of the critical issues...
Vassilis F. Milas, Demosthenes Vouyioukas, Nektari...
SACMAT
2003
ACM
15 years 8 months ago
The role control center: features and case studies
Role-based Access Control (RBAC) models have been implemented not only in self-contained resource management products such as DBMSs and Operating Systems but also in a class of pr...
David F. Ferraiolo, Ramaswamy Chandramouli, Gail-J...