Sciweavers

12032 search results - page 2330 / 2407
» Simulation of Manufacturing Systems
Sort
View
123
Voted
SASN
2006
ACM
15 years 9 months ago
A resilient packet-forwarding scheme against maliciously packet-dropping nodes in sensor networks
This paper focuses on defending against compromised nodes’ dropping of legitimate reports and investigates the misbehavior of a maliciously packet-dropping node in sensor networ...
Suk-Bok Lee, Yoon-Hwa Choi
145
Voted
SASN
2006
ACM
15 years 9 months ago
Autonomous and distributed node recovery in wireless sensor networks
Intrusion or misbehaviour detection systems are an important and widely accepted security tool in computer and wireless sensor networks. Their aim is to detect misbehaving or faul...
Mario Strasser, Harald Vogt
216
Voted
SIGCSE
2006
ACM
362views Education» more  SIGCSE 2006»
15 years 9 months ago
Chirp on crickets: teaching compilers using an embedded robot controller
Traditionally, the topics of compiler construction and language processing have been taught as an elective course in Computer Science curricula. As such, students may graduate wit...
Li Xu, Fred G. Martin
147
Voted
ASAP
2005
IEEE
121views Hardware» more  ASAP 2005»
15 years 9 months ago
Using TLM for Exploring Bus-based SoC Communication Architectures
As billion transistor System-on-chips (SoC) become commonplace and design complexity continues to increase, designers are faced with the daunting task of meeting escalating design...
Sudeep Pasricha, Mohamed Ben-Romdhane
124
Voted
ICDCS
2005
IEEE
15 years 9 months ago
A Dynamic Group Mutual Exclusion Algorithm Using Surrogate-Quorums
The group mutual exclusion problem extends the traditional mutual exclusion problem by associating a type with each critical section. In this problem, processes requesting critica...
Ranganath Atreya, Neeraj Mittal
« Prev « First page 2330 / 2407 Last » Next »