Sciweavers

1692 search results - page 255 / 339
» Evaluation of Security Mechanisms in Wireless Sensor Network...
Sort
View
ADHOC
2007
144views more  ADHOC 2007»
14 years 12 months ago
Adaptive gossip protocols: Managing security and redundancy in dense ad hoc networks
Abstract. Many ad hoc routing algorithms rely on broadcast flooding for location discovery or, more generally, for secure routing applications. Flooding is a robust algorithm but ...
Mike Burmester, Tri Van Le, Alec Yasinsac
SCN
2008
Springer
147views Communications» more  SCN 2008»
14 years 11 months ago
Privacy-preserving secure relative localization in vehicular networks
Relative location information helps build vehicle topology maps. Such maps provide location information of nearby vehicles to drivers. In building a vehicle topology, one must cons...
Lei Tang, Xiaoyan Hong, Phillip G. Bradford
IFIP
2003
Springer
15 years 5 months ago
On the Integration of MPEG-4 Streams Pulled Out of High Performance Mobile Devices and Data Traffic over a Wireless Network
In this work we propose and evaluate mechanisms for the multiplexing and the integrated delivery of Video and Data Traffic over a Wireless Cellular High Speed Packet Switched Netwo...
Spyros Psychis, Polychronis Koutsakis, Michael Pat...
TC
2008
14 years 11 months ago
Iterative Local Solutions for Connected Dominating Set in Ad Hoc Wireless Networks
We propose a general framework of the iterative local solution (ILS) for computing a connected dominating set (CDS) in ad hoc wireless networks, which include wireless sensor netwo...
Jie Wu, Fei Dai, Shuhui Yang
IPPS
2005
IEEE
15 years 5 months ago
On Constructing k-Connected k-Dominating Set in Wireless Networks
An important problem in wireless networks, such as wireless ad hoc and sensor networks, is to select a few nodes to form a virtual backbone that supports routing and other tasks s...
Fei Dai, Jie Wu