Sciweavers

5234 search results - page 949 / 1047
» Simulation of Computer Network Attacks
Sort
View
ICDE
2006
IEEE
142views Database» more  ICDE 2006»
15 years 9 months ago
Location-based Spatial Queries with Data Sharing in Mobile Environments
Mobile clients feature increasingly sophisticated wireless networking support that enables realtime information exchange with remote databases. Location-dependent queries, such as...
Wei-Shinn Ku, Roger Zimmermann
IJCNN
2006
IEEE
15 years 9 months ago
An Interval Type-II Robust Fuzzy Logic Controller for a Static Compensator in a Multimachine Power System
—This paper presents a novel fuzzy logic based controller for a Static Compensator (STATCOM) connected to a power system. Type-II fuzzy systems are selected that enable the contr...
Salman Mohagheghi, Ganesh K. Venayagamoorthy, Rona...
QSHINE
2005
IEEE
15 years 8 months ago
Solving The Multi-Constrained Path Selection Problem By Using Depth First Search
An extended depth-first-search (EDFS) algorithm is proposed to solve the multi-constrained path (MCP) problem in quality-of-service (QoS) routing, which is NP-Complete when the n...
Zhenjiang Li, J. J. Garcia-Luna-Aceves
RTCSA
2005
IEEE
15 years 8 months ago
Scheduling Support for Guaranteed Time Services in IEEE 802.15.4 Low Rate WPAN
We propose a real-time message scheduling algorithm which is applied to schedule periodic realtime messages in IEEE 802.15.4 for LR-WPAN(Low Rate Wireless Personal Area Network). ...
Seongeun Yoo, Daeyoung Kim, Minh-Long Pham, Yoonme...
127
Voted
CDC
2010
IEEE
173views Control Systems» more  CDC 2010»
14 years 10 months ago
Corrective consensus: Converging to the exact average
Consensus algorithms provide an elegant distributed way for computing the average of a set of measurements across a sensor network. However, the convergence of the node estimates t...
Yin Chen, Roberto Tron, Andreas Terzis, René...