Sciweavers

14190 search results - page 2567 / 2838
» computing 2008
Sort
View
SAINT
2008
IEEE
15 years 10 months ago
Matrix Routing -- An Interference Range Insensitive Routing Protocol for Wireless Sensor Networks
Interference ranges can dramatically affect the throughput in wireless sensor networks. While the transmission range defines the maximum physical range of a radio signal the inter...
Monty Beuster, Michael Beigl, Daniel Röhr, Ti...
SASO
2008
IEEE
15 years 10 months ago
An Emergent System for Self-Aligning and Self-Organizing Shape Primitives
Motivated by the natural phenomenon of living cells selforganizing into specific shapes and structures, we present an emergent system that utilizes evolutionary computing methods...
Linge Bai, Manolya Eyiyurekli, David E. Breen
SASO
2008
IEEE
15 years 10 months ago
A Framework for Self-Protecting Cryptographic Key Management
Demands to match security with performance in Web applications where access to shared data needs to be controlled dynamically make self-protecting security schemes attractive. Yet...
Anne V. D. M. Kayem, Patrick Martin, Selim G. Akl,...
SECON
2008
IEEE
15 years 10 months ago
Decentralized Tick Synchronization for Multi-Hop Medium Slotting in Wireless Ad Hoc Networks Using Black Bursts
—In this paper, we present Black Burst Synchronization (BBS)1 , a novel protocol for decentralized network-wide tick synchronization in wireless ad hoc networks, located at MAC l...
Reinhard Gotzhein, Thomas Kuhn
SECURWARE
2008
IEEE
15 years 10 months ago
Fast Algorithms for Local Inconsistency Detection in Firewall ACL Updates
Filtering is a very important issue in next generation networks. These networks consist of a relatively high number of resource constrained devices with very special features, suc...
Sergio Pozo Hidalgo, Rafael Ceballos, Rafael M. Ga...
« Prev « First page 2567 / 2838 Last » Next »