Sciweavers

798 search results - page 152 / 160
» Detecting Topological Change Using a Wireless Sensor Network
Sort
View
JPDC
2007
112views more  JPDC 2007»
14 years 11 months ago
CHEMAS: Identify suspect nodes in selective forwarding attacks
Selective forwarding attacks may corrupt some mission-critical applications such as military surveillance and forest fire monitoring in wireless sensor networks. In such attacks,...
Bin Xiao, Bo Yu, Chuanshan Gao
COMSWARE
2008
IEEE
15 years 1 months ago
Density-first Ad-hoc routing protocol for MANET
In recent years, Mobile Ad-hoc Networks (MANETs) have received tremendous attention because of their self-configuration and self-maintenance capabilities. With open network archite...
Jiong Wang, Sirisha Medidi
MOBISYS
2005
ACM
15 years 11 months ago
Shake them up!: a movement-based pairing protocol for CPU-constrained devices
This paper presents a new pairing protocol that allows two CPU-constrained wireless devices Alice and Bob to establish a shared secret at a very low cost. To our knowledge, this i...
Claude Castelluccia, Pars Mutaf
SSD
2009
Springer
145views Database» more  SSD 2009»
15 years 6 months ago
Versioning of Network Models in a Multiuser Environment
The standard database mechanisms for concurrency control, which include transactions and locking protocols, do not provide the support needed for updating complex geographic data i...
Petko Bakalov, Erik G. Hoel, Sudhakar Menon, Vassi...
94
Voted
IPCCC
2007
IEEE
15 years 6 months ago
Optimising Networks Against Malware
Rapidly-spreading malicious software is an important threat on today’s computer networks. Most solutions that have been proposed to counter this threat are based on our ability ...
Pierre-Marc Bureau, José M. Fernandez