Full network level privacy spectrum comprises of identity, route, location and data privacy. Existing privacy schemes of wireless sensor networks only provide partial network leve...
Riaz Ahmed Shaikh, Hassan Jameel, Brian J. d'Aurio...
— Extensive research has been performed to study selfish data caching in ad hoc networks using game-theoretic analysis. However, due to the caching problem’s theoretical root ...
Wireless networked embedded terminals like personal digital assistants, cell-phones or sensor nodes are typically memory constrained devices. This limitation prevents the developm...
Emanuele Lattanzi, Andrea Acquaviva, Alessandro Bo...
In recent years, large distributed sensor networks have emerged as a new fast-growing application domain for wireless computing. In this paper, we present a distributed applicatio...
Sagnik Bhattacharya, Hyung Kim, Shashi Prabh, Tare...
—As a result of the wide spread of new efficient mobile communication devices, users are more and more willing to find on these devices (PDAs, Smartphones, etc) applications si...
Amir Krifa, Mohamed Karim Sbai, Chadi Barakat, Thi...