Sciweavers

2268 search results - page 142 / 454
» Modeling wireless shadow networks
Sort
View
PERCOM
2011
ACM
14 years 8 months ago
Privacy preservation schemes for querying wireless sensor networks
—In this work we study the problem of query privacy in large scale sensor networks. Motivated by a novel trust model in which clients query networks owned by trusted entities but...
Tassos Dimitriou, Ahmad Sabouri
IWCMC
2006
ACM
15 years 11 months ago
Modeling key agreement in multi-hop ad hoc networks
Securing multicast communications in ad hoc networks has become one of the most challenging research directions in the areas of wireless networking and security. This is especiall...
Giovanni Di Crescenzo, Maria Striki, John S. Baras
NETWORK
2006
89views more  NETWORK 2006»
15 years 4 months ago
Reconsidering microscopic mobility modeling for self-organizing networks
Mobility modeling is a critical step in the design of mobile self-organizing networks. With the emergence of small-scale and short-range wireless communication devices, the commun...
Franck Legendre, Vincent Borrel, Marcelo Dias de A...
ICNSC
2008
IEEE
15 years 11 months ago
Cscan: A Correlation-based Scheduling Algorithm for Wireless Sensor Networks
— Dynamic scheduling management in wireless sensor networks is one of the most challenging problems in long lifetime monitoring applications. In this paper, we propose and evalua...
Qingquan Zhang, Yu Gu, Tian He, Gerald E. Sobelman
INFOCOM
2011
IEEE
14 years 8 months ago
Connectivity maintenance in mobile wireless networks via constrained mobility
—We explore distributed mechanisms for maintaining the physical layer connectivity of a mobile wireless network while still permitting significant area coverage. Moreover, we re...
Joshua Reich, Vishal Misra, Dan Rubenstein, Gil Zu...