Sciweavers

28 search results - page 5 / 6
» Parameterized Verification of Ad Hoc Networks
Sort
View
SAINT
2003
IEEE
13 years 11 months ago
Distributed Authentication for Peer-to-Peer Networks
A public key infrastructure is generally (and effectively) used for cryptographically secure authentication in the networks. Ad-hoc networks are formed in haphazard manner. Securi...
Shardul Gokhale, Partha Dasgupta
MUE
2007
IEEE
81views Multimedia» more  MUE 2007»
14 years 7 days ago
Energy Consumption of Swarm Intelligence inspired Routing Algorithms in MANETs
Swarm Intelligence (SI) inspired routing algorithms have become a research focus in recent years due to their self-organizing nature, which is very suitable to the routing problem...
Jin Wang, Brian J. d'Auriol, Xiaoling Wu, Young-Ko...
DSN
2004
IEEE
13 years 9 months ago
Assured Reconfiguration of Embedded Real-Time Software
It is often the case that safety-critical systems have to be reconfigured during operation because of issues such as changes in the system's operating environment or the fail...
Elisabeth A. Strunk, John C. Knight
ESORICS
2010
Springer
13 years 7 months ago
Formal Analysis of Privacy for Vehicular Mix-Zones
Safety critical applications for recently proposed vehicle to vehicle ad-hoc networks (VANETs) rely on a beacon signal, which poses a threat to privacy since it could allow a vehic...
Morten Dahl, Stéphanie Delaune, Graham Stee...
INFOCOM
2005
IEEE
13 years 11 months ago
Spatial energy balancing in large-scale wireless multihop networks
— In this paper we investigate the use of proactive multipath routing to achieve energy efficient operation of ad hoc wireless networks. The focus is on optimizing trade-offs be...
Seung Jun Baek, Gustavo de Veciana