Search Results - "Pissinou, N"
-
1
Sensor network security: a survey
Published in IEEE Communications surveys and tutorials (01-01-2009)“…Wireless sensor networks (WSNs) use small nodes with constrained capabilities to sense, collect, and disseminate information in many types of applications. As…”
Get full text
Journal Article -
2
Maximizing Lifetime of Sensor Surveillance Systems
Published in IEEE/ACM transactions on networking (01-04-2007)“…This paper addresses the maximal lifetime scheduling problem in sensor surveillance systems. Given a set of sensors and targets in an area, a sensor can watch…”
Get full text
Journal Article -
3
Maximal lifetime scheduling in sensor surveillance networks
Published in Proceedings IEEE 24th Annual Joint Conference of the IEEE Computer and Communications Societies (2005)“…This paper addresses the maximal lifetime scheduling problem in sensor surveillance networks. Given a set of sensors and targets in a Euclidean plane, a sensor…”
Get full text
Conference Proceeding -
4
Spatio-temporal composition of video objects: representation and querying in video database systems
Published in IEEE transactions on knowledge and data engineering (01-11-2001)“…A key characteristic of video data is the associated spatial and temporal semantics. It is important that a video model models the characteristics of objects…”
Get full text
Journal Article -
5
Efficient detection and resolution of deadlocks in distributed databases
Published in Computer communications (15-05-1999)“…Deadlock detection and resolution is one of the major components of a successful distributed database management system. In this article, we discuss deadlock…”
Get full text
Journal Article -
6
A new framework for handling mobile clients in a client–server database system
Published in Computer communications (01-05-2000)“…Mobile computing is a new emerging paradigm that enables mobile computers to access information regardless of their physical location. Data management in this…”
Get full text
Journal Article -
7
On optical communications networks and wideband network architecture
Published in Computer communications (01-05-2000)“…The optical networks of today are just beginning to realize their abilities to carry a tremendous amount of information in the forms of voice, data and video…”
Get full text
Journal Article -
8
An ECA object service to support active distributed objects
Published in Information sciences (1997)“…Existing Object Management Group (OMG) standards (such as the Common Object Request Broker Architecture specification) provide specific details on how to model…”
Get full text
Journal Article -
9
An efficient approximate algorithm for delay-cost-constrained QoS routing
Published in Proceedings Tenth International Conference on Computer Communications and Networks (Cat. No.01EX495) (2001)“…The problem of finding a path with two additive constraints is called a multi-constrained path (MCP) problem in the literature. In this paper, we explore the…”
Get full text
Conference Proceeding -
10
On the design of a location and query management strategy for mobile and wireless environments
Published in Computer communications (15-05-1999)“…The rapid development of wireless digital communication technology led to a new computing environment known as mobile or nomadic computing. Mobile computing no…”
Get full text
Journal Article -
11
OpenFlow-Based Flow-Level Bandwidth Provisioning for CICQ Switches
Published in IEEE transactions on computers (01-09-2013)“…Flow-level bandwidth provisioning (FBP) achieves fine-grained bandwidth assurance for individual flows. It is especially important for virtualization-based…”
Get full text
Journal Article -
12
A new routing algorithm for low Earth orbit satellite networks
Published in Proceedings Tenth International Conference on Computer Communications and Networks (Cat. No.01EX495) (2001)“…In the modern world of telecommunications, the concept of wireless global coverage is of the utmost importance. However, real global coverage can only be…”
Get full text
Conference Proceeding -
13
Waiting time of handoff calls for the wireless mobile networks with dependent calls arrival processes and impatient calls
Published in 2000 IEEE Wireless Communications and Networking Conference. Conference Record (Cat. No.00TH8540) (2000)“…This paper studies the quasi-waiting time, the actual waiting time of the handoff calls in the buffer and the actual call holding times of new calls for the…”
Get full text
Conference Proceeding -
14
Encapsulation of ATM cell connections
Published in Computer communications (01-07-1996)“…The goal of this research is to provide a framing structure for a sequence of ATM cells which carry multimedia traffic. We will redefine the concept of a…”
Get full text
Journal Article -
15
Intelligent controller with cache for critical infrastructures
Published in IET International Conference on Frontier Computing. Theory, Technologies and Applications (2010)“…Critical infrastructures require precise and swift response to a local disturbance before it would spread and accumulate. To meet the demand on response time,…”
Get full text
Conference Proceeding -
16
Game Theoretic Modeling and Evolution of Trust in Autonomous Multi-Hop Networks: Application to Network Security and Privacy
Published in 2011 IEEE International Conference on Communications (ICC) (01-06-2011)“…Future applications will require autonomous devices to be interconnected to form a network. Such networks will not have a central manager; each node will…”
Get full text
Conference Proceeding -
17
Third generation wireless network: the integration of GSM and Mobile IP
Published in 2000 IEEE Wireless Communications and Networking Conference. Conference Record (Cat. No.00TH8540) (2000)“…Consumers are demanding world-wide cellular access to the Internet. This requires a global standard and effective means of accessing the Internet from wireless…”
Get full text
Conference Proceeding -
18
Towards Designing a Trusted Routing Solution in Mobile Ad Hoc Networks
Published in Mobile networks and applications (01-12-2005)“…Designing a trusted and secure routing solution in an untrustworthy scenario is always a challenging problem. Lack of physical security and low trust levels…”
Get full text
Journal Article -
19
A hybrid method to cellular traffic using optic beam interconnects
Published in 2000 IEEE Wireless Communications and Networking Conference. Conference Record (Cat. No.00TH8540) (2000)“…We propose a new type of wireless system, which is to provide for multimedia, bandwidth upon demand and quality of service (QoS) to the user. The system…”
Get full text
Conference Proceeding -
20
The secure model for enterprise connectivity
Published in Proceedings Ninth International Conference on Computer Communications and Networks (Cat.No.00EX440) (2000)“…The need for implementing data security over enterprise networks has been brought to the forefront of the e-commerce marketplace by an increasing number of…”
Get full text
Conference Proceeding