Sciweavers

10044 search results - page 126 / 2009
» Authentication in Wireless Networks
Sort
View
PEWASUN
2006
ACM
15 years 5 months ago
Coordinated data aggregation in wireless sensor networks using the Omega failure detector
We present an algorithm implementing the failure detector class omega (Ω) in the crash-recovery model to coordinate data aggregation in wireless sensor networks. In order to mini...
Mikel Larrea, Cristian Martín, José ...
WICON
2008
15 years 27 days ago
What is optimal scheduling in wireless networks?
We consider a wireless network consisting of multiple transmitters with multicast traffic destined for a set of receivers. We are interested in the problem of joint scheduling and...
Anna Pantelidou, Anthony Ephremides
ICC
2009
IEEE
115views Communications» more  ICC 2009»
15 years 6 months ago
End-Host Authentication and Authorization for Middleboxes Based on a Cryptographic Namespace
—Today, middleboxes such as firewalls and network address translators have advanced beyond simple packet forwarding and address mapping. They also inspect and filter traffic, ...
Tobias Heer, René Hummen, Miika Komu, Stefa...
ICDE
2010
IEEE
247views Database» more  ICDE 2010»
15 years 11 months ago
Efficient Verification of Shortest Path Search via Authenticated Hints
Shortest path search in transportation networks is unarguably one of the most important online search services nowadays (e.g., Google Maps, MapQuest, etc), with applications spanni...
Man Lung Yiu, Yimin Lin, Kyriakos Mouratidis
CORR
2006
Springer
142views Education» more  CORR 2006»
14 years 11 months ago
Order-Optimal Data Aggregation in Wireless Sensor Networks - Part I: Regular Networks
The predominate traffic patterns in a wireless sensor network are many-to-one and one-to-many communication. Hence, the performance of wireless sensor networks is characterized by ...
Richard J. Barton, Rong Zheng