Sciweavers

1692 search results - page 257 / 339
» Evaluation of Security Mechanisms in Wireless Sensor Network...
Sort
View
ICNS
2006
IEEE
15 years 5 months ago
Mobile Ad Hoc Networking Approach to Detecting and Querying Events Related to Farm Animals
This paper proposes a mobile ad hoc networking approach to detecting and querying events related to farm animals such as oestrus, animal diseases and decreased efficiency of pastu...
Milena Radenkovic, Bartosz Wietrzyk
NBIS
2009
Springer
15 years 4 months ago
A Security Framework for JXTA-Overlay
At present time, the maturity of P2P research field has pushed through new problems such us those related with security. For that reason, security starts to become one of the key...
Joan Arnedo-Moreno, Keita Matsuo, Leonard Barolli,...
ISCC
2003
IEEE
180views Communications» more  ISCC 2003»
15 years 5 months ago
Wireless Application Protocol Transport Layer Performance
: In this paper, simulation-based performance evaluation of the Wireless Application Protocol (WAP) Transport Lay er Protocol, which may be suitable for Combat Net Radio (CNR), is ...
Gökhan Kahraman, Semih Bilgen
IPSN
2005
Springer
15 years 5 months ago
Design considerations for solar energy harvesting wireless embedded systems
Abstract— Sustainable operation of battery powered wireless embedded systems (such as sensor nodes) is a key challenge, and considerable research effort has been devoted to energ...
Vijay Raghunathan, Aman Kansal, Jason Hsu, Jonatha...
CORR
2010
Springer
152views Education» more  CORR 2010»
14 years 12 months ago
Automatic analysis of distance bounding protocols
Distance bounding protocols are used by nodes in wireless networks for the crucial purpose of estimating their distances to other nodes. Past efforts to analyze these protocols hav...
Sreekanth Malladi, Bezawada Bruhadeshwar, Kishore ...