Sciweavers

2282 search results - page 423 / 457
» Detecting Compromised Nodes in Wireless Sensor Networks
Sort
View
CORR
2010
Springer
146views Education» more  CORR 2010»
15 years 2 months ago
Multicast Outage Probability and Transmission Capacity of Multihop Wireless Networks
Multicast transmission, wherein the same packet must be delivered to multiple receivers, is an important aspect of sensor and tactical networks and has several distinctive traits ...
Chun-Hung Liu, Jeffrey G. Andrews
IFIP
2003
Springer
15 years 7 months ago
A Service Discovery Model for Wireless and Mobile Terminals in IPv6
As the mobility and the number of affordable, powerful, and highly portable devices becoming networked increases, so will the amount of networked services offered, managed and disc...
Bilhanan Silverajan, Jaakko Kalliosalo, Jarmo Harj...
CHI
2005
ACM
16 years 2 months ago
Symbolic objects in a networked gestural sound interface
SignalPlay is a sensor-based interactive sound environment in which familiar objects encourage exploration and discovery of sound interfaces through the process of play. Embedded ...
Eric Kabisch, Amanda Williams, Paul Dourish
118
Voted
ICDCS
2010
IEEE
15 years 5 months ago
Sentomist: Unveiling Transient Sensor Network Bugs via Symptom Mining
—Wireless Sensor Network (WSN) applications are typically event-driven. While the source codes of these applications may look simple, they are executed with a complicated concurr...
Yangfan Zhou, Xinyu Chen, Michael R. Lyu, Jiangchu...
ESORICS
2010
Springer
15 years 3 months ago
Traffic Analysis against Low-Latency Anonymity Networks Using Available Bandwidth Estimation
Abstract. We introduce a novel remotely-mounted attack that can expose the network identity of an anonymous client, hidden service, and anonymizing proxies. To achieve this, we emp...
Sambuddho Chakravarty, Angelos Stavrou, Angelos D....