With the advance of sensing technologies and its applications, sophisticated (i.e., mobile, wireless) sensor networks are gaining increasing interest. Although such networks allow to implement interesting tracking fun...
详细信息
With the advance of sensing technologies and its applications, sophisticated (i.e., mobile, wireless) sensor networks are gaining increasing interest. Although such networks allow to implement interesting tracking functionalities, their performance isseverely affected by energy limitations. This paper introduces an activity scheduling protocol that extends the network lifetime while the area coverage is kept unchanged. A cost-benefit analysis is conducted in order to assess the cost of the additional number of sensors that should be deployed to implement our protocol. simulation resultsshow that the proposed approach outperforms the existing scheduling techniques.
This paper presents a relational approach for structuring security decision databases to support advanced automated functionalities. We represent attacks and countermeasures in a unifying environment using relational ...
详细信息
This paper presents a relational approach for structuring security decision databases to support advanced automated functionalities. We represent attacks and countermeasures in a unifying environment using relational algebra. Both are viewed as actions that behave in opposite manners. We introduce an ordering that allows to rank security decisions according to their efficiency with respect a given attack. Furthermore, we prove that this ordering defines a lattice-structure that can serve to manage the decision database.
This paper presents a relational approach for structuring security decision databases to support advanced automated functionalities. We represent attacks and countermeasures in a unifying environment using relational ...
详细信息
This paper presents a relational approach for structuring security decision databases to support advanced automated functionalities. We represent attacks and countermeasures in a unifying environment using relational algebra. Both are viewed as actions that act in opposite manners. We introduce an ordering that allows to rank security decisions according to their efficiency with respect to a given attack. Furthermore, we prove that this ordering defines a lattice-structure that can serve to manage the decision database
暂无评论