Sciweavers

1692 search results - page 290 / 339
» Evaluation of Security Mechanisms in Wireless Sensor Network...
Sort
View
CONEXT
2009
ACM
15 years 27 days ago
Traffic management and resource allocation in small wired/wireless networks
We consider the problem of traffic management in small networks with both wireless and wired devices, connected to the Internet through a single gateway. Examples of such networks...
Christos Gkantsidis, Thomas Karagiannis, Peter B. ...
DCOSS
2006
Springer
15 years 3 months ago
Efficient and Robust Data Dissemination Using Limited Extra Network Knowledge
We propose a new data dissemination protocol for wireless sensor networks, that basically pulls some additional knowledge about the network in order to subsequently improve data fo...
Ioannis Chatzigiannakis, Athanasios Kinalis, Sotir...
ICCCN
2008
IEEE
15 years 6 months ago
A Power-Preserving Broadcast Protocol for WSNs with DoS Resistance
—Broadcast presents a special challenge for Wireless Sensor Networks (WSNs). In some situation such as time synchronization or building routing path, broadcasting messages must b...
Chien-Chun Ni, Tien-Ruey Hsiang, J. D. Tygar
NOMS
2010
IEEE
222views Communications» more  NOMS 2010»
14 years 10 months ago
Bayesian decision aggregation in collaborative intrusion detection networks
—Cooperation between intrusion detection systems (IDSs) allows collective information and experience from a network of IDSs to be shared to improve the accuracy of detection. A c...
Carol J. Fung, Quanyan Zhu, Raouf Boutaba, Tamer B...
DSN
2009
IEEE
15 years 6 months ago
Xprobe2++: Low volume remote network information gathering tool
Active operating system fingerprinting is the process of actively determining a target network system’s underlying operating system type and characteristics by probing the targ...
Fedor V. Yarochkin, Ofir Arkin, Meder Kydyraliev, ...