Sciweavers

5901 search results - page 1025 / 1181
» Algorithms for Wireless Sensor Networks
Sort
View
ADHOCNOW
2008
Springer
15 years 4 months ago
Distributed Monitoring in Ad Hoc Networks: Conformance and Security Checking
Ad hoc networks are exposed more than traditional networks to security threats due to their mobility and open architecture aspects. In addition, any dysfunction due to badly congu...
Wissam Mallouli, Bachar Wehbi, Ana R. Cavalli
103
Voted
CCS
2008
ACM
15 years 5 days ago
Revocation games in ephemeral networks
A frequently proposed solution to node misbehavior in mobile ad hoc networks is to use reputation systems. But in ephemeral networks - a new breed of mobile networks where contact...
Maxim Raya, Mohammad Hossein Manshaei, Márk...
ISCAPDCS
2003
14 years 11 months ago
Performance of a Jini-based Ad Hoc Network Authentication Scheme
Ad hoc networks provide a dynamically reconfigurable network infrastructure where entities can participate at will. Jini technology can be used to implement an ad hoc network, and...
M. M. McMahon, D. M. Needham, J. B. Datko
100
Voted
PERCOM
2011
ACM
14 years 1 months ago
A demonstration of PyViz, a flexible smart home visualization tool
—As smart home technologies continue to be deployed in research and real world environments, there continues to be a need for quality visualization of the smart home data. This d...
Brian L. Thomas, Aaron S. Crandall
MOBIHOC
2012
ACM
13 years 18 days ago
Channel width assignment using relative backlog: extending back-pressure to physical layer
With recent advances in Software-defined Radios (SDRs), it has indeed became feasible to dynamically adapt the channel widths at smaller time scales. Even though the advantages o...
Parth H. Pathak, Sankalp Nimbhorkar, Rudra Dutta
« Prev « First page 1025 / 1181 Last » Next »