Sciweavers

4248 search results - page 790 / 850
» Simulating hci for all
Sort
View
118
Voted
NETWORKING
2008
15 years 2 months ago
DBR: Depth-Based Routing for Underwater Sensor Networks
Abstract. Providing scalable and efficient routing services in underwater sensor networks (UWSNs) is very challenging due to the unique characteristics of UWSNs. Firstly, UWSNs oft...
Hai Yan, Zhijie Jerry Shi, Jun-Hong Cui
128
Voted
SEDE
2008
15 years 2 months ago
Improving Fuzzy Algorithms for Automatic Magnetic Resonance Image Segmentation
: In this paper, we present reliable algorithms for fuzzy k-means and C-means that could improve MRI segmentation. Since the k-means or FCM method aims to minimize the sum of squar...
Ennumeri A. Zanaty, Sultan Aljahdali, Narayan C. D...
117
Voted
PEWASUN
2007
ACM
15 years 2 months ago
Worst-case lifetime computation of a wireless sensor network by model-checking
Wireless Sensor Network (WSN) technology is now mature enough to be used in numerous application domains. However, due to the restricted amount of energy usually allocated to each...
Laurent Mounier, Ludovic Samper, Wassim Znaidi
77
Voted
SDM
2007
SIAM
89views Data Mining» more  SDM 2007»
15 years 2 months ago
Preventing Information Leaks in Email
The widespread use of email has raised serious privacy concerns. A critical issue is how to prevent email information leaks, i.e., when a message is accidentally addressed to non-...
Vitor R. Carvalho, William W. Cohen
103
Voted
WICON
2008
15 years 2 months ago
Risk-aware beacon scheduling for tree-based ZigBee/IEEE 802.15.4 wireless networks
In a tree-based ZigBee network, ZigBee routers (ZRs) must schedule their beacon transmission times to avoid beacon collisions. The beacon schedule determines packet delivery laten...
Li-Hsing Yen, Yee Wei Law, Marimuthu Palaniswami