Sciweavers

2503 search results - page 106 / 501
» Building Computer Network Attacks
Sort
View
CORR
2010
Springer
153views Education» more  CORR 2010»
14 years 10 months ago
Secured Greedy Perimeter Stateless Routing for Wireless Sensor Networks
Wireless sensor networks are collections of large number of sensor nodes. The sensor nodes are featured with limited energy, computation and transmission power. Each node in the n...
P. Samundiswary, D. Sathian, P. Dananjayan
BIOWIRE
2007
Springer
15 years 4 months ago
The Topological Fortress of Termites
Abstract. Termites are known for building some of the most elaborate architectures observed in the animal world. We here analyse some topological properties of three dimensional ne...
Andrea Perna, Christian Jost, Sergi Valverde, Jacq...
58
Voted
PERCOM
2010
ACM
14 years 8 months ago
Crowd-sourcing world models with OpenRoomMap
Abstract—The construction of world models typically requires laborious survey and cataloguing of a building’s contents. OpenRoomMap attempts to crowd-source this information by...
Andrew Colin Rice, Oliver J. Woodman
WS
2005
ACM
15 years 3 months ago
Secure time synchronization service for sensor networks
In this paper, we analyze attacks on existing time synchronization protocols for wireless sensor networks. We propose a secure time synchronization toolbox to counter these attack...
Saurabh Ganeriwal, Srdjan Capkun, Chih-Chieh Han, ...
PAM
2010
Springer
15 years 4 months ago
Web Timeouts and Their Implications
Abstract. Timeouts play a fundamental role in network protocols, controlling numerous aspects of host behavior at different layers of the protocol stack. Previous work has documen...
Zakaria Al-Qudah, Michael Rabinovich, Mark Allman