Sciweavers

950 search results - page 37 / 190
» presence 2008
Sort
View
COMCOM
2006
100views more  COMCOM 2006»
14 years 9 months ago
A secure alternate path routing in sensor networks
This paper presents a secure alternate path routing in sensor networks. Our alternate path scheme makes the routing protocol resilient in the presence of malicious nodes that laun...
Suk-Bok Lee, Yoon-Hwa Choi
IJNM
2008
112views more  IJNM 2008»
14 years 9 months ago
How to avoid packet droppers with proactive routing protocols for ad hoc networks
Routing protocols for mobile ad hoc networks (MANETs) have been an active area of research for the last decade, with many very interesting potential as well as actual applications...
Ignacy Gawedzki, Khaldoun Al Agha
JCO
2008
85views more  JCO 2008»
14 years 9 months ago
Locating and detecting arrays for interaction faults
The identification of interaction faults in component-based systems has focussed on indicating the presence of faults, rather than their location and magnitude. While this is a va...
Charles J. Colbourn, Daniel W. McClary
JNSM
2008
73views more  JNSM 2008»
14 years 9 months ago
Probe Station Placement for Robust Monitoring of Networks
1 In this paper we address the problem of selecting probe station locations from where probes can be sent to monitor all the nodes in the network. Probe station placement involves...
Maitreya Natu, Adarshpal S. Sethi
DAM
2007
91views more  DAM 2007»
14 years 9 months ago
Integer linear programming approaches for non-unique probe selection
In addition to their prevalent use for analyzing gene expression, DNA microarrays are an efficient tool for biological, medical, and industrial applications because of their abil...
Gunnar W. Klau, Sven Rahmann, Alexander Schliep, M...