Sciweavers

1405 search results - page 65 / 281
» We Are No Longer A Priesthood
Sort
View
117
Voted
SASN
2006
ACM
15 years 6 months ago
Autonomous and distributed node recovery in wireless sensor networks
Intrusion or misbehaviour detection systems are an important and widely accepted security tool in computer and wireless sensor networks. Their aim is to detect misbehaving or faul...
Mario Strasser, Harald Vogt
HSNMC
2004
Springer
121views Multimedia» more  HSNMC 2004»
15 years 6 months ago
RBU+: Recursive Binding Update for End-to-End Route Optimization in Nested Mobile Networks
In this paper, we propose an end-to-end route optimization scheme for nested mobile networks, which we refer to as Recursive Binding Update plus (RBU+). A nested mobile network is ...
Ho-sik Cho, Eun Kyoung Paik, Yanghee Choi
120
Voted
EOR
2008
311views more  EOR 2008»
15 years 20 days ago
Optimal pricing, EOL (end of life) warranty, and spare parts manufacturing strategy amid product transition
We study firm's strategy to determine its product price and warranty period, and plan the spare parts manufacturing so as to maximize its profit and at the same time to fulfi...
Bowon Kim, Sangsun Park
CCGRID
2011
IEEE
14 years 4 months ago
Improving Utilization of Infrastructure Clouds
— A key advantage of Infrastructure-as-a-Service (IaaS) clouds is providing users on-demand access to resources. However, to provide on-demand access, cloud providers must either...
Paul Marshall, Kate Keahey, Timothy Freeman
98
Voted
VTC
2010
IEEE
125views Communications» more  VTC 2010»
14 years 11 months ago
Solving the Coupon Collector's Problem for the Safety Beaconing in the IEEE 802.11p WAVE
—For the WAVE applications built on safety beacons, it is imperative that the neighboring vehicle information be collected as quickly and efficiently as possible. But the unreli...
Hyundoc Seo, Sangki Yun, Hyogon Kim