Sciweavers

254 search results - page 38 / 51
» Counting with Population Protocols
Sort
View
PERCOM
2007
ACM
15 years 10 months ago
Physically Unclonable Function-Based Security and Privacy in RFID Systems
Radio Frequency Identification (RFID) is an increasingly popular technology that uses radio signals for object identification. Tracking and authentication in RFID tags have raised...
Leonid Bolotnyy, Gabriel Robins
BROADNETS
2007
IEEE
15 years 5 months ago
DATALITE: a distributed architecture for traffic analysis via light-weight traffic digest
-- In this paper, we propose DATALITE, a Distributed Architecture for Traffic Analysis via LIghtweight Traffic digEst, which introduces a set of new distributed algorithms and prot...
Wing Cheong Lau, Murali S. Kodialam, T. V. Lakshma...
ICNP
2007
IEEE
15 years 5 months ago
Multicast Algorithms for Multi-Channel Wireless Mesh Networks
— Multicast is a key technology that provides efficient data communication among a set of nodes for wireless multi-hop networks. In sensor networks and MANETs, multicast algorit...
Guo-Kai Zeng, Bo Wang 0001, Yong Ding, Li Xiao, Ma...
HPCC
2007
Springer
15 years 4 months ago
Reliable Event Detection and Congestion Avoidance in Wireless Sensor Networks
Due to dense deployment and innumerable amount of traffic flow in wireless sensor networks (WSNs), congestion becomes more common phenomenon from simple periodic traffic to unpredi...
Md. Mamun-Or-Rashid, Muhammad Mahbub Alam, Md. Abd...
INFOCOM
2003
IEEE
15 years 3 months ago
Analysis of Routing Characteristics in the Multicast Infrastructure
Abstract— As the multicast-capable part of the Internet continues to evolve, important questions to ask are whether the protocols are operating correctly, the topology is well co...
Prashant Rajvaidya, Kevin C. Almeroth