Sciweavers

702 search results - page 56 / 141
» An overlay approach to data security in ad-hoc networks
Sort
View
TISSEC
2008
100views more  TISSEC 2008»
14 years 9 months ago
Message Dropping Attacks in Overlay Networks: Attack Detection and Attacker Identification
Overlay multicast networks are used by service providers to distribute contents such as web pages, streaming multimedia data, or security updates to a large number of users. Howeve...
Liang Xie, Sencun Zhu
MOBIHOC
2001
ACM
15 years 9 months ago
Localized algorithms in wireless ad-hoc networks: location discovery and sensor exposure
The development of practical, localized algorithms is probably the most needed and most challenging task in wireless ad-hoc sensor networks (WASNs). Localized algorithms are a spe...
Seapahn Meguerdichian, Sasha Slijepcevic, Vahag Ka...
TNC
2004
140views Education» more  TNC 2004»
14 years 11 months ago
Seamless Multimedia Communications in Heterogeneous Mobile Access Networks
With the advent of the new wireless technologies allowing for higher data rates, the provision of high quality multimedia services over the upcoming wireless and mobile networks i...
Pedro M. Ruiz, Juan A. Botía, Antonio F. G&...
DATASCIENCE
2007
84views more  DATASCIENCE 2007»
14 years 9 months ago
Open Data for Global Science
The digital revolution has transformed the accumulation of properly curated public research data into an essential upstream resource whose value increases with use.1 The potential...
Paul F. Uhlir, Peter Schröder
AINA
2006
IEEE
15 years 4 months ago
Application Programming Interface for Configuration of Multi-Robot Sensor Networks
In this paper we propose a design of Application Programming Interfaces (APIs) for configuration of Multi-Robot Sensor Networks (MRSNs). Such networks have unique aspects: intenti...
Junya Yamashita, Ryohei Suzuki, Kei Sawai, Hiroki ...