Sciweavers

1718 search results - page 252 / 344
» Simulating Network Robustness for Critical Infrastructure Ne...
Sort
View
CORR
2002
Springer
156views Education» more  CORR 2002»
14 years 9 months ago
MPICH-G2: A Grid-Enabled Implementation of the Message Passing Interface
Application development for distributed-computing ``Grids'' can benefit from tools that variously hide or enable application-level management of critical aspects of the ...
Nicholas T. Karonis, Brian R. Toonen, Ian T. Foste...
ITIIS
2010
154views more  ITIIS 2010»
14 years 4 months ago
Research on Anti-Reader Collision Protocols for Integrated RFID-WSNs
Integrated RFID-WSNs (wireless sensor networks) have recently been researched to provide object identities, sensing information, mobile service, and network functionalities. In in...
Doohyun Ko, Bumjin Kim, Sunshin An
IWCMC
2006
ACM
15 years 3 months ago
TARP: trust-aware routing protocol
Security is a critical issue in a mobile ad hoc network (MANET). In most of the previous protocols security is an added layer above the routing protocol. We propose a TrustAware R...
Loay Abusalah, Ashfaq A. Khokhar, G. BenBrahim, W....
VTC
2006
IEEE
199views Communications» more  VTC 2006»
15 years 3 months ago
Comparison of User Mobility Pattern Prediction Algorithms to increase Handover Trigger Accuracy
— The estimation of correct triggers for handover in cellular networks belongs to the critical tasks for accurate network operation. The importance of seamless handover even rise...
Stefan Michaelis, Christian Wietfeld
ICPR
2008
IEEE
15 years 11 months ago
Extraction of shoe-print patterns from impression evidence using Conditional Random Fields
Impression evidence in the form of shoe-prints are commonly found in crime scenes. A critical step in automatic shoe-print identification is extraction of the shoe-print pattern. ...
Sargur N. Srihari, Veshnu Ramakrishnan