Sciweavers

937 search results - page 151 / 188
» Employing Simulation to Evaluate Designs: The APEX Approach
Sort
View
ICNP
2009
IEEE
15 years 6 months ago
Topological Detection on Wormholes in Wireless Ad Hoc and Sensor Networks
—Wormhole attack is a severe threat to wireless ad hoc and sensor networks. Most existing countermeasures either require specialized hardware devices or make strong assumptions o...
Dezun Dong, Mo Li, Yunhao Liu, Xiang-Yang Li, Xian...
HPDC
2007
IEEE
15 years 6 months ago
Cooperative secondary authorization recycling
As distributed applications such as Grid and enterprise systems scale up and become increasingly complex, their authorization infrastructures—based predominantly on the request-...
Qiang Wei, Matei Ripeanu, Konstantin Beznosov
VR
2007
IEEE
15 years 6 months ago
Variability-Aware Latency Amelioration in Distributed Environments
Application designers of collaborative distributed Virtual Environments must account for the influence of the network connection and its detrimental effects on user performance. ...
Alexey Tumanov, Robert S. Allison, Wolfgang St&uum...
LCN
2006
IEEE
15 years 5 months ago
Landscape-3D; A Robust Localization Scheme for Sensor Networks over Complex 3D Terrains
— Despite the fact that sensor networks could often be deployed over three-dimensional (3D) terrains, most approaches on sensor localizations are designed and evaluated consideri...
Liqiang Zhang, Xiaobo Zhou, Qiang Cheng
IPPS
2005
IEEE
15 years 5 months ago
On Constructing k-Connected k-Dominating Set in Wireless Networks
An important problem in wireless networks, such as wireless ad hoc and sensor networks, is to select a few nodes to form a virtual backbone that supports routing and other tasks s...
Fei Dai, Jie Wu