Sciweavers

1692 search results - page 264 / 339
» Evaluation of Security Mechanisms in Wireless Sensor Network...
Sort
View
SAC
2003
ACM
15 years 5 months ago
TinyGALS: A Programming Model for Event-Driven Embedded Systems
Networked embedded systems such as wireless sensor networks are usually designed to be event-driven so that they are reactive and power efficient. Programming embedded systems wit...
Elaine Cheong, Judith Liebman, Jie Liu, Feng Zhao
WCNC
2008
IEEE
15 years 6 months ago
A Resource Allocation Scheme for TH-UWB Networks with Multiple Sinks
Abstract—In this work, we study the time-slot allocation problem in a multi-sink single-hop TH-UWB network scenario, where the traffic from a sensor node is anycasted via a sing...
Hwee-Xian Tan, Mun-Choon Chan, Peng Yong Kong, Che...
ESAS
2004
Springer
15 years 3 months ago
Advanced Detection of Selfish or Malicious Nodes in Ad Hoc Networks
Abstract. The fact that security is a critical problem when implementing mobile ad hoc networks (MANETs) is widely acknowledged. One of the different kinds of misbehavior a node ma...
Frank Kargl, Andreas Klenk, Stefan Schlott, Michae...
MOBISYS
2009
ACM
16 years 11 days ago
mFerio: the design and evaluation of a peer-to-peer mobile payment system
In this paper, we present the design and evaluation of a nearfield communication-based mobile p2p payment application called mFerio which is designed to replace cash-based transac...
Rajesh Krishna Balan, Narayan Ramasubbu, Komsit Pr...
PERCOM
2006
ACM
15 years 11 months ago
Dependability and Accountability for Context-aware Middleware Systems
In this paper we present a framework to provide dependability through accountability. Our proposal exploits the asymmetry present in the majority of sensor data processing to chea...
Andrew C. Rice, Alastair R. Beresford