Sciweavers

859 search results - page 126 / 172
» Key Establishment for General Ad Hoc Network
Sort
View
HCI
2001
15 years 1 months ago
Identifying Critical Interaction Scenarios for Innovative User Modeling
Usability testing typically focuses on methodology and metrics, while the specific interactions being tested are chosen in an ad hoc way. This paper demonstrates a framework for o...
V. Katie Emery, Julie A. Jacko, Thitima Kongnakorn...
BROADNETS
2007
IEEE
15 years 6 months ago
Assessing discreet packet-dropping attacks using nearest-neighbor and path-vector attribution
— A Mobile Ad-Hoc Network (MANET) is considered with nodes that may act selfishly or maliciously by simply dropping data packets rather than forwarding them. We study a distribu...
Arnab Das 0002, George Kesidis, Venkat Pothamsetty
PODC
2004
ACM
15 years 5 months ago
Asynchronous group key exchange with failures
Group key exchange protocols allow a group of servers communicating over an asynchronous network of point-to-point links to establish a common key, such that an adversary which fu...
Christian Cachin, Reto Strobl
ICASSP
2008
IEEE
15 years 6 months ago
Stability analysis of the consensus-based distributed LMS algorithm
We deal with consensus-based online estimation and tracking of (non-) stationary signals using ad hoc wireless sensor networks (WSNs). A distributed (D-) least-mean square (LMS) l...
Ioannis D. Schizas, Gonzalo Mateos, Georgios B. Gi...
ADHOC
2006
86views more  ADHOC 2006»
14 years 12 months ago
Energy considerations for topology-unaware TDMA MAC protocols
Since the energy budget of mobile nodes is limited, the performance of a networking protocol for such users should be evaluated in terms of its energy efficiency, in addition to t...
Konstantinos Oikonomou, Ioannis Stavrakakis