Sciweavers

766 search results - page 124 / 154
» Modeling energy efficiency in wireless internet communicatio...
Sort
View
74
Voted
MOBIHOC
2008
ACM
15 years 9 months ago
Self-monitoring for sensor networks
Local monitoring is an effective mechanism for the security of wireless sensor networks (WSNs). Existing schemes assume the existence of sufficient number of active nodes to carry...
Dezun Dong, Yunhao Liu, Xiangke Liao
P2P
2003
IEEE
205views Communications» more  P2P 2003»
15 years 3 months ago
Peer-to-Peer Spatial Queries in Sensor Networks
Sensor networks, that consist of potentially several thousands of nodes each with sensing (heat, sound, light, magnetism, etc.) and wireless communication capabilities, provide gr...
Murat Demirbas, Hakan Ferhatosmanoglu
CPHYSICS
2010
88views more  CPHYSICS 2010»
14 years 9 months ago
Distributed computing as a virtual supercomputer: Tools to run and manage large-scale BOINC simulations
Distributed computing (DC) projects tackle large computational problems by exploiting the donated processing power of thousands of volunteered computers, connected through the Int...
Toni Giorgino, Matt J. Harvey, Gianni De Fabritiis
ISCC
2003
IEEE
112views Communications» more  ISCC 2003»
15 years 3 months ago
Performance Evaluation of Public-Key Cryptosystem Operations in WTLS Protocol
WTLS (Wireless Transport Layer Security) is an important standard protocol for secure wireless access to Internet services. WTLS employs public-key cryptosystems during the handsh...
Albert Levi, Erkay Savas
76
Voted
INFOCOM
1999
IEEE
15 years 2 months ago
User-Friendly Access Control for Public Network Ports
We are facing a growing user demand for ubiquitous Internet access. As a result, network ports and wireless LANs are becoming common in public spaces inside buildings such as loung...
Guido Appenzeller, Mema Roussopoulos, Mary Baker