Sciweavers

11580 search results - page 2050 / 2316
» Communication vs. Computation
Sort
View
JSAC
2006
127views more  JSAC 2006»
15 years 5 months ago
Location-based compromise-tolerant security mechanisms for wireless sensor networks
Abstract-- Node compromise is a serious threat to wireless sensor networks deployed in unattended and hostile environments. To mitigate the impact of compromised nodes, we propose ...
Yanchao Zhang, Wei Liu, Wenjing Lou, Yuguang Fang
151
Voted
JSAC
2006
183views more  JSAC 2006»
15 years 5 months ago
HiRLoc: high-resolution robust localization for wireless sensor networks
In this paper we address the problem of robustly estimating the position of randomly deployed nodes of a Wireless Sensor Network (WSN), in the presence of security threats. We prop...
Loukas Lazos, Radha Poovendran
NETWORK
2008
94views more  NETWORK 2008»
15 years 5 months ago
Detecting compromised routers via packet forwarding behavior
While it is widely understood that criminal miscreants are subverting large numbers of Internet-connected computers (e.g., for bots, spyware, SPAM forwarding), it is less well app...
Alper Tugay Mizrak, Stefan Savage, Keith Marzullo
MONET
2006
141views more  MONET 2006»
15 years 5 months ago
An Energy-Optimal Algorithm for Neighbor Discovery in Wireless Sensor Networks
We consider sensor networks in which individual nodes with on-board sensing and low-power transmitters and receivers establish connections with neighboring nodes. The overall objec...
Ritesh Madan, Sanjay Lall
IJCAT
2007
80views more  IJCAT 2007»
15 years 4 months ago
Realising voice dialogue management in a collaborative virtual environment
: The applications of 3D-virtual environments and Voice User Interface (VUI) on personal computers have received significant attention in recent years. Since speech is the most nat...
Chun-Feng Liao, Tsai-Yen Li
« Prev « First page 2050 / 2316 Last » Next »