Sciweavers

777 search results - page 114 / 156
» presence 2010
Sort
View
SECON
2010
IEEE
14 years 10 months ago
RDAS: Reputation-Based Resilient Data Aggregation in Sensor Network
Data aggregation in wireless sensor networks is vulnerable to security attacks and natural failures. A few nodes can drastically alter the result of the aggregation by reporting er...
Carlos R. Perez-Toro, Rajesh Krishna Panta, Saurab...
150
Voted
SECON
2010
IEEE
14 years 10 months ago
Transmission Scheduling for Routing Paths in Cognitive Radio Mesh Networks
Nodes in a cognitive radio mesh network may select from a set of available channels to use provided they do not interfere with primary users. This ability can improve overall netwo...
Brendan Mumey, Xia Zhao, Jian Tang, Richard S. Wol...
84
Voted
SIGSOFT
2010
ACM
14 years 10 months ago
Rethinking the economics of software engineering
Reliance on skilled developers reduces the return on investment for important software engineering tasks such as establishing program correctness. This position paper introduces a...
Todd W. Schiller, Michael D. Ernst
109
Voted
SIGSOFT
2010
ACM
14 years 10 months ago
Golden implementation driven software debugging
The presence of a functionally correct golden implementation has a significant advantage in the software development life cycle. Such a golden implementation is exploited for soft...
Ansuman Banerjee, Abhik Roychoudhury, Johannes A. ...
115
Voted
VRST
2010
ACM
14 years 10 months ago
Evaluating depth perception of photorealistic mixed reality visualizations for occluded objects in outdoor environments
Enabling users to accurately perceive the correct depth of occluded objects is one of the major challenges in user interfaces for Mixed Reality (MR). Therefore, several visualizat...
Arindam Dey, Andrew Cunningham, Christian Sandor