Sciweavers

4620 search results - page 722 / 924
» Comparing Object Encodings
Sort
View
150
Voted
PERCOM
2007
ACM
16 years 2 months ago
Dynamic Key-Updating: Privacy-Preserving Authentication for RFID Systems
The objective of private authentication for Radio Frequency Identification (RFID) systems is to allow valid readers to explicitly authenticate their dominated tags without leaking...
Li Lu, Jinsong Han, Lei Hu, Yunhao Liu, Lionel M. ...
PERCOM
2007
ACM
16 years 2 months ago
Static Path Planning for Mobile Beacons to Localize Sensor Networks
In this paper, we study the static path planning problem with wireless sensor network localization as the primary objective. We consider a model in which sensors are assumed to be...
Rui Huang, Gergely V. Záruba
116
Voted
MOBIHOC
2005
ACM
16 years 2 months ago
Efficient geographic routing in multihop wireless networks
We propose a new link metric called normalized advance (NADV) for geographic routing in multihop wireless networks. NADV selects neighbors with the optimal trade-off between proxi...
Seungjoon Lee, Bobby Bhattacharjee, Suman Banerjee
EWSN
2008
Springer
16 years 2 months ago
Efficient Clustering for Improving Network Performance in Wireless Sensor Networks
Clustering is an important mechanism in large multi-hop wireless sensor networks for obtaining scalability, reducing energy consumption and achieving better network performance. Mo...
Tal Anker, Danny Bickson, Danny Dolev, Bracha Hod
140
Voted
SODA
2010
ACM
208views Algorithms» more  SODA 2010»
15 years 12 months ago
Correlation Robust Stochastic Optimization
We consider a robust model proposed by Scarf, 1958, for stochastic optimization when only the marginal probabilities of (binary) random variables are given, and the correlation be...
Shipra Agrawal, Yichuan Ding, Amin Saberi, Yinyu Y...