Sciweavers

702 search results - page 50 / 141
» An overlay approach to data security in ad-hoc networks
Sort
View
COMCOM
2006
114views more  COMCOM 2006»
14 years 9 months ago
A comparison of epidemic algorithms in wireless sensor networks
We consider the problem of reliable data dissemination in the context of wireless sensor networks. For some application scenarios, reliable data dissemination to all nodes is nece...
Mert Akdere, Cemal Çagatay Bilgin, Ozan Ger...
APIN
2000
116views more  APIN 2000»
14 years 9 months ago
Application of Cascade Correlation Networks for Structures to Chemistry
Abstract. We present the application of Cascade Correlation for structures to QSPR (quantitative structureproperty relationships) and QSAR (quantitative structure-activity relation...
Anna Maria Bianucci, Alessio Micheli, Alessandro S...
MSWIM
2005
ACM
15 years 3 months ago
Towards resilient geographic routing in WSNs
In this paper, we consider the security of geographical forwarding (GF) – a class of algorithms widely used in ad hoc and sensor networks. In GF, neighbors exchange their locati...
Nael B. Abu-Ghazaleh, Kyoung-Don Kang, Ke Liu
ACSAC
2007
IEEE
15 years 4 months ago
Channels: Runtime System Infrastructure for Security-Typed Languages
Security-typed languages (STLs) are powerful tools for provably implementing policy in applications. The programmer maps policy onto programs by annotating types with information ...
Boniface Hicks, Tim Misiak, Patrick McDaniel
CORR
1998
Springer
100views Education» more  CORR 1998»
14 years 9 months ago
Push vs. Pull in Web-Based Network Management
In this paper, we build on the concept of embedded management application, proposed by Wellens and Auerbach, and present two models of network management application designs that ...
Jean-Philippe Martin-Flatin