Sciweavers

824 search results - page 57 / 165
» Deployment of Public-Key Infrastructure in Wireless Data Net...
Sort
View
ASE
2005
96views more  ASE 2005»
14 years 9 months ago
A Termination Detection Protocol for Use in Mobile Ad Hoc Networks
As devices become smaller and wireless networking technologies improve, the popularity of mobile computing continues to rise. In today's world, many consider devices such as c...
Gruia-Catalin Roman, Jamie Payton
JDCTA
2010
139views more  JDCTA 2010»
14 years 4 months ago
Tracing Anonymous Mobile Attackers in Wireless Network
In a flooding-based distributed denial-of-service (DDoS) attack, an adversary attempts to exhaust a target's computing resource. To detect DDoS attacks in a network environme...
Ming Hour Yang, Shiuhpyng Shieh
MOBISYS
2008
ACM
15 years 9 months ago
The pothole patrol: using a mobile sensor network for road surface monitoring
This paper investigates an application of mobile sensing: detecting and reporting the surface conditions of roads. We describe a system and associated algorithms to monitor this i...
Jakob Eriksson, Lewis Girod, Bret Hull, Ryan Newto...
EWSN
2004
Springer
15 years 9 months ago
Lessons from a Sensor Network Expedition
Habitat monitoring is an important driving application for wireless sensor networks (WSNs). Although researchers anticipate some challenges arising in the real-world deployments of...
Robert Szewczyk, Joseph Polastre, Alan M. Mainwari...
VTC
2008
IEEE
158views Communications» more  VTC 2008»
15 years 4 months ago
A Novel Load Balanced and Lifetime Maximization Routing Protocol in Wireless Sensor Networks
Abstract— Balancing energy consumption and prolonging network lifetime are open challenges in Wireless Sensor Networks. In this paper, we design a novel load balanced routing pro...
Chengjie Wu, Ruixi Yuan, Hongchao Zhou