The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
In this paper we have addressed the problem of deploying wireless sensors into any random irregular sensing terrain. Traditional deployments often assume homogeneous environments, which ignore the effect of terrain profile as well as the in-network obstacles situated randomly like buildings, trees, roads and so on. Only an effective and efficient deployment of nodes will leads to proper routing as...
Context-aware systems offer entirely new opportunities for application developers and for end users by gathering context data and adapting systems' behavior accordingly. In this paper, we propose a Context Aware ESB (CA-ESB) that will publish and discover services based on location context. The main modules of the framework consist of Context Provider (senses location context), Context Aware Logic...
In this paper, we have proposed a set of metrics to quantitatively estimate the amount of consistency in object-oriented design based on UML use case, activity and class diagrams for a requirement. We have proposed a design compliance metrics II (DCM-II) to quantitatively measure the extent of consistency between use case, activity and class diagrams implementing the use cases for the same requirement...
Deployment of sensors inside an irregular region is one of the most fundamental challenges of wireless sensor networks. The performance of an effective and efficient sensor network is highly related to the proper configuration and design of the network and effective communication between the sensors deployed. For an irregular space of random shape and size, it is practically very difficult to detect...
Network Security has gained an ever increasing importance today because of the increased dependence on the networks. One way to assess the threats to the networks is through the use of the attack graphs. However, because of their sheer enormity and complexity the analysis becomes difficult. Given an attack graph the identification of a probable attack path still remains an issue. This paper presents...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.