Sciweavers

2282 search results - page 362 / 457
» Detecting Compromised Nodes in Wireless Sensor Networks
Sort
View
IEEECIT
2010
IEEE
15 years 2 months ago
Concept and Prototype for a Real-Time Enabled Publish/Subscribe System
—Distributed computing systems often strive to decouple their communicating components (threads on a single node, or nodes in a network) from each other with respect to time, spa...
Matthias Andree, Alexander Gebel, Holger Karl
TMC
2010
250views more  TMC 2010»
15 years 2 months ago
Duty Cycle Control for Low-Power-Listening MAC Protocols
Energy efficiency is of the utmost importance in wireless sensor networks. The family of low-power-listening MAC protocols was proposed to reduce one form of energy dissipation...
Christophe J. Merlin, Wendi Beth Heinzelman
ISCC
2009
IEEE
177views Communications» more  ISCC 2009»
15 years 11 months ago
SECLOUD: Source and Destination Seclusion Using Clouds for wireless ad hoc networks
—The privacy of communicating entities in wireless ad hoc networks is extremely important due to the potential of their being identified and subsequently subjected to attacks (e...
Razvi Doomun, Thaier Hayajneh, Prashant Krishnamur...
IPPS
2005
IEEE
15 years 9 months ago
On Constructing k-Connected k-Dominating Set in Wireless Networks
An important problem in wireless networks, such as wireless ad hoc and sensor networks, is to select a few nodes to form a virtual backbone that supports routing and other tasks s...
Fei Dai, Jie Wu
MOBIHOC
2004
ACM
16 years 3 months ago
A single-channel solution for transmission power control in wireless ad hoc networks
Transmission power control (TPC) has a great potential to increase the throughput of a mobile ad hoc network (MANET). Existing TPC schemes achieve this goal by using additional ha...
Alaa Muqattash, Marwan Krunz