Sciweavers

859 search results - page 151 / 172
» Key Establishment for General Ad Hoc Network
Sort
View
103
Voted
MOBIHOC
2008
ACM
15 years 11 months ago
An O(log n) dominating set protocol for wireless ad-hoc networks under the physical interference model
Dealing with interference is one of the primary challenges to solve in the design of protocols for wireless ad-hoc networks. Most of the work in the literature assumes localized o...
Christian Scheideler, Andréa W. Richa, Paol...
MOBIHOC
2005
ACM
15 years 11 months ago
Toward resilient security in wireless sensor networks
Node compromise poses severe security threats in wireless sensor networks. Unfortunately, existing security designs can address only a small, fixed threshold number of compromised...
Hao Yang, Fan Ye, Yuan Yuan, Songwu Lu, William A....
MOBICOM
2003
ACM
15 years 5 months ago
Geographic routing without location information
For many years, scalable routing for wireless communication systems was a compelling but elusive goal. Recently, several routing algorithms that exploit geographic information (e....
Ananth Rao, Christos H. Papadimitriou, Scott Shenk...
CCS
2003
ACM
15 years 5 months ago
Incentive-based modeling and inference of attacker intent, objectives, and strategies
Although the ability to model and infer Attacker Intent, Objectives and Strategies (AIOS) may dramatically advance the literature of risk assessment, harm prediction, and predicti...
Peng Liu, Wanyu Zang
ISORC
2000
IEEE
15 years 4 months ago
Deadline Handling in Real-Time Distributed Objects
: Deadline handling is a fundamental part of real-time computing but has been practiced in ad hoc forms for decades. A general framework for systematic deadline handling in real-ti...
K. H. Kim, Juqiang Liu, Moon-hae Kim