Sciweavers

470 search results - page 94 / 94
» An adaptive probabilistic trust model and its evaluation
Sort
View
SASN
2005
ACM
13 years 11 months ago
On the security of group communication schemes based on symmetric key cryptosystems
Many emerging applications in both wired and wireless networks, such as information dissemination and distributed collaboration in an adversarial environment, need support of secu...
Shouhuai Xu
SIGMETRICS
2000
ACM
177views Hardware» more  SIGMETRICS 2000»
13 years 10 months ago
A case for end system multicast
— The conventional wisdom has been that IP is the natural protocol layer for implementing multicast related functionality. However, more than a decade after its initial proposal,...
Yang-Hua Chu, Sanjay G. Rao, Hui Zhang
TPDS
2008
105views more  TPDS 2008»
13 years 5 months ago
peerTalk: A Peer-to-Peer Multiparty Voice-over-IP System
Multiparty voice-over-IP (MVoIP) services allow a group of people to freely communicate with each other via the Internet, which have many important applications such as online gami...
Xiaohui Gu, Zhen Wen, Philip S. Yu, Zon-Yin Shae
GIS
2010
ACM
13 years 3 months ago
Energy-efficient processing of spatio-temporal queries in wireless sensor networks
Research on Moving Object Databases (MOD) has resulted in sophisticated query mechanisms for moving objects and regions. Wireless Sensor Networks (WSN) support a wide range of app...
Markus Bestehorn, Klemens Böhm, Erik Buchmann...
CORR
2011
Springer
219views Education» more  CORR 2011»
13 years 24 days ago
Active Markov Information-Theoretic Path Planning for Robotic Environmental Sensing
Recent research in multi-robot exploration and mapping has focused on sampling environmental fields, which are typically modeled using the Gaussian process (GP). Existing informa...
Kian Hsiang Low, John M. Dolan, Pradeep K. Khosla