Sciweavers

12052 search results - page 2103 / 2411
» computer 2010
Sort
View
TMC
2010
138views more  TMC 2010»
14 years 11 months ago
Secure Data Collection in Wireless Sensor Networks Using Randomized Dispersive Routes
—Compromised-node and denial-of-service are two key attacks in wireless sensor networks (WSNs). In this paper, we study routing mechanisms that circumvent (bypass) black holes fo...
Tao Shu, Marwan Krunz, Sisi Liu
TMC
2010
109views more  TMC 2010»
14 years 11 months ago
Uncertainty Modeling and Reduction in MANETs
—Evaluating and quantifying trust stimulates collaboration in mobile ad hoc networks (MANETs). Many existing reputation systems sharply divide the trust value into right or wrong...
Feng Li, Jie Wu
TMC
2010
135views more  TMC 2010»
14 years 11 months ago
Maximizing the Lifetime of Wireless Sensor Networks with Mobile Sink in Delay-Tolerant Applications
—This paper proposes a framework to maximize the lifetime the wireless sensor network (WSN) by using a mobile sink when the underlying applications tolerate delayed information d...
YoungSang Yun, Ye Xia
91
Voted
TMI
2010
128views more  TMI 2010»
14 years 11 months ago
Segmentation of the Outer Vessel Wall of the Common Carotid Artery in CTA
—A novel method is presented for carotid artery vessel wall segmentation in computed tomography angiography (CTA) data. First the carotid lumen is semi-automatically segmented us...
Danijela Vukadinovic, Theo van Walsum, Rashindra M...
TOIT
2010
115views more  TOIT 2010»
14 years 11 months ago
A market-based bandwidth charging framework
The increasing demand for high-bandwidth applications such as video-on-demand and grid computing is reviving interest in bandwidth reservation schemes. Earlier attempts did not ca...
David Michael Turner, Vassilis Prevelakis, Angelos...
« Prev « First page 2103 / 2411 Last » Next »