Sciweavers

1677 search results - page 218 / 336
» A distributed security scheme for ad hoc networks
Sort
View
CORR
2011
Springer
148views Education» more  CORR 2011»
14 years 5 months ago
Modeling the pairwise key distribution scheme in the presence of unreliable links
Abstract— We investigate the secure connectivity of wireless sensor networks under the pairwise key distribution scheme of Chan et al.. Unlike recent work which was carried out u...
Osman Yagan, Armand M. Makowski
156
Voted
ICDE
2008
IEEE
122views Database» more  ICDE 2008»
15 years 11 months ago
On Signatures for Communication Graphs
Abstract-- Communications between individuals can be represented by (weighted, multi-) graphs. Many applications operate on communication graphs associated with telephone calls, em...
Graham Cormode, Flip Korn, S. Muthukrishnan, Yihua...
INFOCOM
2002
IEEE
15 years 3 months ago
Joint Scheduling and Power Control for Wireless Ad-hoc Networks
—In this paper, we introduce a cross-layer design framework to the multiple access problem in contention-based wireless ad hoc networks. The motivation for this study is twofold,...
Tamer A. ElBatt, Anthony Ephremides
SIGMETRICS
2010
ACM
203views Hardware» more  SIGMETRICS 2010»
14 years 10 months ago
An analytical framework to infer multihop path reliability in MANETs
Abstract Due to complexity and intractability reasons, most of the analytical studies on the reliability of communication paths in mobile ad hoc networks are based on the assumptio...
Nelson Antunes, Gonçalo Jacinto, Antó...
DAGSTUHL
2006
14 years 11 months ago
Managing power amongst a group of networked embedded fpgas using dynamic reconfiguration and task migration
Small unpiloted aircraft (UAVs) each have limited power budgets. If a group (swarm) of small UAVs is organised to perform a common task such as geo-location, then it is possible t...
David A. Kearney, Mark Jasiunas