Sciweavers

2282 search results - page 436 / 457
» Detecting Compromised Nodes in Wireless Sensor Networks
Sort
View
112
Voted
DEXAW
2004
IEEE
90views Database» more  DEXAW 2004»
15 years 5 months ago
Opportunistic Dissemination of Spatio-Temporal Resource Information in Mobile Peer to Peer Networks
In this paper we examine the dissemination of availability reports about resources in mobile peer-topeer networks, where vehicles, pedestrian or sensors communicate with each othe...
Ouri Wolfson, Bo Xu
97
Voted
CORR
2010
Springer
79views Education» more  CORR 2010»
15 years 2 months ago
A Multi-hop Multi-source Algebraic Watchdog
In our previous work (`An Algebraic Watchdog for Wireless Network Coding'), we proposed a new scheme in which nodes can detect malicious behaviors probabilistically, police th...
MinJi Kim, Muriel Médard, João Barro...
126
Voted
TON
2012
13 years 4 months ago
A Game-Theoretic Approach to Anonymous Networking
—Anonymous wireless networking is studied when an adversary monitors the transmission timing of an unknown subset of the network nodes. For a desired quality of service (QoS), as...
Parvathinathan Venkitasubramaniam, Lang Tong
SASO
2008
IEEE
15 years 8 months ago
Towards Desynchronization of Multi-hop Topologies
In this paper we study desynchronization, a closelyrelated primitive to graph coloring. A valid graph coloring is an assignment of colors to nodes such that no node’s color is t...
Julius Degesys, Radhika Nagpal
SAC
2011
ACM
14 years 4 months ago
Tracking continuous topological changes of complex moving regions
A moving region whose location and extend change over time can imply topological changes such as region split and hole formation. To study this phenomenon is useful in many applic...
Hechen Liu, Markus Schneider