Sciweavers

2200 search results - page 217 / 440
» Hop Integrity in Computer Networks
Sort
View
MUM
2006
ACM
181views Multimedia» more  MUM 2006»
15 years 10 months ago
Cross-layer design for providing service oriented architecture in a mobile Ad Hoc network
This paper presents a novel cross-layer design for providing service oriented architecture (SOA) in a mobile ad hoc network (MANET). In the design SOA service discovery is integra...
Tommi Halonen, Timo Ojala
CSCW
2004
ACM
15 years 7 months ago
Leveraging social networks for information sharing
Saori is a computation infrastructure that enables users and enduser applications to leverage social networks to mediate information dissemination. Saori provides users with aware...
Jeremy Goecks, Elizabeth D. Mynatt
IAT
2007
IEEE
15 years 10 months ago
Network Intrusion Detection by Means of Community of Trusting Agents
We apply advanced agent trust modeling techniques to identify malicious traffic in computer networks. Our work integrates four state-of-the-art techniques from anomaly detection,...
Martin Rehák, Michal Pechoucek, Karel Barto...
123
Voted
ADHOCNOW
2005
Springer
15 years 9 months ago
An Intelligent Sensor Network for Oceanographic Data Acquisition
In this paper we describe the deployment of an offshore wireless sensor network and the lightweight intelligence that was integrated into the data acquisition and forwarding softwa...
Chris M. Roadknight, Antonio González, Laur...
ACSAC
2003
IEEE
15 years 9 months ago
Forum Session: Security for Wireless Sensor Networks
Wireless networks of low-power sensing devices are poised to become a ubiquitous part of the computing landscape. Proposed applications of these networks range from health care to...
David Carman, Daniel Coffin, Bruno Dutertre, Vipin...