Sciweavers

4859 search results - page 804 / 972
» Distributed Computing in a Heterogeneous Computing Environme...
Sort
View
DCOSS
2011
Springer
14 years 3 months ago
Type-safe updating for modular WSN software
—Modular software, in which strongly-separated units of functionality can be independently added to and removed from a node’s running software, offers a promising approach to e...
Barry Porter, Utz Roedig, Geoff Coulson
ICDCS
2011
IEEE
14 years 3 months ago
JR-SND: Jamming-Resilient Secure Neighbor Discovery in Mobile Ad Hoc Networks
Abstract—Secure neighbor discovery is fundamental to mobile ad hoc networks (MANETs) deployed in hostile environments and refers to the process in which two neighboring nodes exc...
Rui Zhang 0007, Yanchao Zhang, Xiaoxia Huang
174
Voted
ICDCSW
2011
IEEE
14 years 3 months ago
Link-Level Network Topology Generation
Abstract—Internet topology generation involves producing synthetic network topologies that imitate the characteristics of the Internet. Although the accuracy of newly developed n...
Mehmet Burak Akgun, Mehmet Hadi Gunes
203
Voted
IPPS
2006
IEEE
15 years 9 months ago
Detecting selective forwarding attacks in wireless sensor networks
Selective forwarding attacks may corrupt some missioncritical applications such as military surveillance and forest fire monitoring. In these attacks, malicious nodes behave like...
Bo Yu, Bin Xiao
131
Voted
BIOINFORMATICS
2012
13 years 5 months ago
SSuMMo: rapid analysis, comparison and visualization of microbial communities
Motivation: Next-generation sequencing methods are generating increasingly massive datasets, yet still do not fully capture genetic diversity in the richest environments. To under...
Alex L. B. Leach, James P. J. Chong, Kelly R. Rede...