Sciweavers

3883 search results - page 660 / 777
» Design mentoring based on design evolution analysis
Sort
View
SENSYS
2005
ACM
15 years 10 months ago
A new approach for establishing pairwise keys for securing wireless sensor networks
Wireless sensor networks based on highly resource-constrained devices require symmetric cryptography in order to make them secure. Integral to this is the exchange of unique symme...
Arno Wacker, Mirko Knoll, Timo Heiber, Kurt Rother...
SIGDOC
2005
ACM
15 years 10 months ago
Animating pervasive computing
It is difficult to present new, complex ideas in ways that are informative and interesting in situations where a vast amount of information has to be delivered and understood quic...
Andrée Woodcock, John R. Burns, Sarah Mount...
SIGECOM
2005
ACM
92views ECommerce» more  SIGECOM 2005»
15 years 10 months ago
True costs of cheap labor are hard to measure: edge deletion and VCG payments in graphs
We address the problem of lowering the buyer’s expected payments in shortest path auctions, where the buyer’s goal is to purchase a path in a graph in which edges are owned by...
Edith Elkind
WOWMOM
2005
ACM
127views Multimedia» more  WOWMOM 2005»
15 years 10 months ago
Game Theoretic Power Aware Wireless Data Access
Abstract—This paper examines the following wireless data access scenario: a number of clients are interested in a set of data items kept at the server. A client sends a query req...
Mark Kai Ho Yeung, Yu-Kwong Kwok
WS
2005
ACM
15 years 10 months ago
Group-based key pre-distribution in wireless sensor networks
Many key pre-distribution techniques have been developed recently to establish pairwise keys for wireless sensor networks. To further improve these schemes, researchers have propo...
Donggang Liu, Peng Ning, Wenliang Du