Sciweavers

1251 search results - page 212 / 251
» Using Semantics for Resource Allocation in Computing Service...
Sort
View
128
Voted
SASN
2006
ACM
15 years 7 months ago
Location-aware key predistribution scheme for wide area wireless sensor networks
Key predistribution in wireless sensor networks refers to the problem of distributing secret keys among sensors prior to deployment. Solutions appeared in the literature can be cl...
Katerina Simonova, Alan C. H. Ling, Xiaoyang Sean ...
109
Voted
WIMOB
2008
IEEE
15 years 8 months ago
A Moderate to Robust Game Theoretical Model for Intrusion Detection in MANETs
—One popular solution for reducing the resource consumption of Intrusion Detection System (IDS) in MANET is to elect a head-cluster (leader) to provide intrusion detection servic...
Hadi Otrok, Noman Mohammed, Lingyu Wang, Mourad De...
ICPADS
2008
IEEE
15 years 8 months ago
UDB: Using Directional Beacons for Localization in Underwater Sensor Networks
Underwater Sensor Networks (UWSN) are widely used in many applications, such as oceanic resource exploration, pollution monitoring, tsunami warnings and mine reconnaissance. In UW...
Hanjiang Luo, Yiyang Zhao, Zhongwen Guo, Siyuan Li...
GLOBECOM
2007
IEEE
15 years 8 months ago
Power-Modulated Challenge-Response Schemes for Verifying Location Claims
—Location information should be verifiable in order to support new computing and information services. In this paper, we adapt the classical challenge-response method for authen...
Yu Zhang, Zang Li, Wade Trappe
VISSYM
2007
15 years 4 months ago
Multi-Resolution Techniques for Visual Exploration of Large Time-Series Data
Time series are a data type of utmost importance in many domains such as business management and service monitoring. We address the problem of visualizing large time-related data ...
Ming C. Hao, Umeshwar Dayal, Daniel A. Keim, Tobia...