Sciweavers

1569 search results - page 285 / 314
» Constrained Navigation Environments
Sort
View
SP
2005
IEEE
105views Security Privacy» more  SP 2005»
15 years 7 months ago
Detection of Denial-of-Message Attacks on Sensor Network Broadcasts
So far, sensor network broadcast protocols assume a trustworthy environment. However, in safety and missioncritical sensor networks this assumption may not be valid and some senso...
Jonathan M. McCune, Elaine Shi, Adrian Perrig, Mic...
124
Voted
WS
2004
ACM
15 years 7 months ago
SeRLoc: secure range-independent localization for wireless sensor networks
In many applications of wireless sensor networks (WSN), sensors are deployed un-tethered in hostile environments. For locationaware WSN applications, it is essential to ensure tha...
Loukas Lazos, Radha Poovendran
152
Voted
ICN
2009
Springer
15 years 6 months ago
New Algorithm for the Design of Topology Aware Hypercube in Multi-hop Ad Hoc Networks
Securing group communications in resource constrained, infrastructure-less environments such as Mobile Ad Hoc Networks (MANETs) has become one of the most challenging research dire...
Maria Striki, Kyriakos Manousakis, John S. Baras
101
Voted
EICS
2009
ACM
15 years 5 months ago
A formal approach supporting the comparative predictive assessment of the interruption-tolerance of interactive systems
This paper presents an approach for investigating in a predictive way potential disruptive effects of interruptions on task performance in a multitasking environment. The approach...
Philippe A. Palanque, Marco Winckler, Jean-Fran&cc...
123
Voted
ATAL
2006
Springer
15 years 5 months ago
The communication complexity of coalition formation among autonomous agents
It is self-evident that in numerous Multiagent settings, selfish agents stand to benefit from cooperating by forming coalitions. Nevertheless, negotiating a stable distribution of...
Ariel D. Procaccia, Jeffrey S. Rosenschein