Sciweavers

141 search results - page 25 / 29
» Intrusion Tolerance in Wireless Environments: An Experimenta...
Sort
View
68
Voted
HOTOS
1997
IEEE
15 years 1 months ago
The Role of Trace Modulation in Building Mobile Computing Systems
ty of accurately re-creating a mobile networkingAbstract environment in vitro argues for live experiments. On the In this paper we put forth the view that trace other hand, the dif...
Mahadev Satyanarayanan, Brian Noble
89
Voted
MDM
2009
Springer
192views Communications» more  MDM 2009»
15 years 4 months ago
Thresholded Range Aggregation in Sensor Networks
— The recent advances in wireless sensor technologies (e.g., Mica, Telos motes) enable the economic deployment of lightweight sensors for capturing data from their surrounding en...
Zhifeng Lin, Man Lung Yiu, Nikos Mamoulis
MOBICOM
1996
ACM
15 years 1 months ago
Building Reliable Mobile-Aware Applications Using the Rover Toolkit
This paper discusses extensions to the Rover toolkit for constructing reliable mobile-aware applications. The extensions improve upon the existing failure model, which only addres...
Anthony D. Joseph, M. Frans Kaashoek
98
Voted
MOBIHOC
2007
ACM
15 years 9 months ago
Surviving attacks on disruption-tolerant networks without authentication
Disruption-Tolerant Networks (DTNs) deliver data in network environments composed of intermittently connected nodes. Just as in traditional networks, malicious nodes within a DTN ...
John Burgess, George Dean Bissias, Mark D. Corner,...
90
Voted
MOBISYS
2008
ACM
15 years 9 months ago
Symphony: synchronous two-phase rate and power control in 802.11 wlans
Adaptive transmit power control in 802.11 Wireless LANs (WLANs) on a per-link basis helps increase network capacity and improves battery life of Wifi-enabled mobile devices. Howev...
Kishore Ramachandran, Ravi Kokku, Honghai Zhang, M...