Sciweavers

2200 search results - page 334 / 440
» Hop Integrity in Computer Networks
Sort
View
127
Voted
ISPA
2005
Springer
15 years 9 months ago
Hybrid Authentication and Key Management Scheme for WSANs
:Wireless Sensor and Actor Networks (WSANs) consist of three types of nodes with different capabilities and functions. Because of these heterogeneities, current network security ...
Xiaomei Cao, Mao Lin Huang, YueQuan Chen, Guihai C...
SENSYS
2004
ACM
15 years 8 months ago
Sensor network-based countersniper system
An ad-hoc wireless sensor network-based system is presented that detects and accurately locates shooters even in urban environments. The system consists of a large number of cheap...
Gyula Simon, Miklós Maróti, Á...
COOPIS
2003
IEEE
15 years 8 months ago
Implementation Experience with OMG's SCIOP Mapping
Longevity of distributed computing middleware standards, such as CORBA, depend on their ability to support a range of applications by providing low overhead access in a uniform man...
Gautam H. Thaker, Patrick J. Lardieri, Chuck Winte...
LCN
2003
IEEE
15 years 8 months ago
Reliable Multipath Routing with Fixed Delays in MANET Using Regenerating Nodes
This paper proposes a new framework in mobile ad hoc networks (MANET) for reliable multipath routing with fixed delays based on packet level Forward Error Control (FEC). The nove...
Rui Ma, Jacek Ilow
DBISP2P
2003
Springer
152views Database» more  DBISP2P 2003»
15 years 8 months ago
An Adaptive and Scalable Middleware for Distributed Indexing of Data Streams
Abstract. We are witnessing a dramatic increase in the use of datacentric distributed systems such as global grid infrastructures, sensor networks, network monitoring, and various ...
Ahmet Bulut, Roman Vitenberg, Fatih Emekçi,...