Sciweavers

5107 search results - page 898 / 1022
» Design Issue Of ECTST
Sort
View
ICDCS
2010
IEEE
14 years 12 months ago
Distributed Coverage in Wireless Ad Hoc and Sensor Networks by Topological Graph Approaches
Abstract—Coverage problem is a fundamental issue in wireless ad hoc and sensor networks. Previous techniques for coverage scheduling often require accurate location information o...
Dezun Dong, Yunhao Liu, Kebin Liu, Xiangke Liao
CSCW
2008
ACM
14 years 11 months ago
Understanding collective play in an urban screen game
In recent years there has been a growing interest in urban screen applications. While there have been several deployments of these technologies in our urban environments, surprisi...
Kenton O'Hara, Maxine Glancy, Simon Robertshaw
CTRSA
2008
Springer
137views Cryptology» more  CTRSA 2008»
14 years 11 months ago
Beyond Secret Handshakes: Affiliation-Hiding Authenticated Key Exchange
Public key based authentication and key exchange protocols are not usually designed with privacy in mind and thus involve cleartext exchanges of identities and certificates before ...
Stanislaw Jarecki, Jihye Kim, Gene Tsudik
SNPD
2008
14 years 11 months ago
An Approach to Modeling Software Safety
: Software for safety-critical systems has to deal with the hazards identified by safety analysis in order to make the system safe, risk-free and fail-safe. Software safety is a co...
M. Ben Swarup, P. Seetha Ramaiah
ACE
2004
186views Education» more  ACE 2004»
14 years 11 months ago
TinkerNet: A Low-Cost Networking Laboratory
The 2002 SIGCOMM Workshop on Educational Challenges for Computer Networking [Kur02a] exposed many issues related to teaching computer networking with the need for a laboratory in ...
Michael Erlinger, Mart Molle, Titus Winters, Chris...