Sciweavers

242 search results - page 37 / 49
» Deterministic small-world communication networks
Sort
View
MOBICOM
2004
ACM
15 years 5 months ago
Revisiting the TTL-based controlled flooding search: optimality and randomization
In this paper we consider the problem of searching for a node or an object (i.e., piece of data, file, etc.) in a large network. Applications of this problem include searching fo...
Nicholas B. Chang, Mingyan Liu
SASN
2006
ACM
15 years 5 months ago
Location-aware key predistribution scheme for wide area wireless sensor networks
Key predistribution in wireless sensor networks refers to the problem of distributing secret keys among sensors prior to deployment. Solutions appeared in the literature can be cl...
Katerina Simonova, Alan C. H. Ling, Xiaoyang Sean ...
ADHOC
2007
121views more  ADHOC 2007»
14 years 12 months ago
Power-aware single- and multipath geographic routing in sensor networks
Nodes in a sensor network, operating on power limited batteries, must save power to minimize the need for battery replacement. We note that the range of transmission has a signi...
Shibo Wu, K. Selçuk Candan
INFOCOM
2009
IEEE
15 years 6 months ago
An Evaluation of Weak State Mechanism Design for Indirection in Dynamic Networks
—State signaling and maintenance mechanisms play crucial roles in communication network protocols. State is used to facilitate indirections in protocols such as routing. Design a...
Utku Gunay Acer, Alhussein A. Abouzeid, Shivkumar ...
JSAC
2010
188views more  JSAC 2010»
14 years 6 months ago
Random-walk based approach to detect clone attacks in wireless sensor networks
Abstract--Wireless sensor networks (WSNs) deployed in hostile environments are vulnerable to clone attacks. In such attack, an adversary compromises a few nodes, replicates them, a...
Yingpei Zeng, Jiannong Cao, Shigeng Zhang, Shanqin...