Sciweavers

24529 search results - page 4640 / 4906
» Computing on Authenticated Data
Sort
View
IPPS
2006
IEEE
15 years 10 months ago
Honeybees: combining replication and evasion for mitigating base-station jamming in sensor networks
By violating MAC-layer protocols, the jamming attack aims at blocking successful communication among wireless nodes. Wireless sensor networks (WSNs) are highly vulnerable to jammi...
Sherif M. Khattab, Daniel Mossé, Rami G. Me...
IPPS
2006
IEEE
15 years 10 months ago
Battery-aware router scheduling in wireless mesh networks
Wireless mesh networks recently emerge as a flexible, low-cost and multipurpose networking platform with wired infrastructure connected to the Internet. A critical issue in mesh ...
Chi Ma, Zhenghao Zhang, Yuanyuan Yang
IPPS
2006
IEEE
15 years 10 months ago
A method to improve structural modeling based on conserved domain clusters
—Homology modeling requires an accurate alignment between a query sequence and its homologs with known three-dimensional (3D) information. Current structural modeling techniques ...
Fa Zhang, Lin Xu, Bo Yuan
ISCC
2006
IEEE
112views Communications» more  ISCC 2006»
15 years 10 months ago
The Precision and Energetic Cost of Snapshot Estimates in Wireless Sensor Networks
— Even for a specific application, the design space of wireless sensor networks is enormous, and traditional disciplinary boundaries are disappearing in the search for efficien...
Paul G. Flikkema
P2P
2006
IEEE
153views Communications» more  P2P 2006»
15 years 10 months ago
A Reciprocation-Based Economy for Multiple Services in Peer-to-Peer Grids
Peer-to-peer grids aim to build computational grids encompassing thousands of sites. To achieve this scale, such systems cannot rely on trust or off-line negotiations among partic...
Miranda Mowbray, Francisco Vilar Brasileiro, Nazar...
« Prev « First page 4640 / 4906 Last » Next »