Sciweavers

5056 search results - page 235 / 1012
» Network Coding Theory
Sort
View
159
Voted
ADHOCNOW
2006
Springer
15 years 9 months ago
Authenticated In-Network Programming for Wireless Sensor Networks
Abstract. Current in-network programming protocols for sensor networks allow an attacker to gain control of the network or disrupt its proper functionality by disseminating malicio...
Ioannis Krontiris, Tassos Dimitriou
135
Voted
GLOBECOM
2006
IEEE
15 years 9 months ago
A Game-Theoretic Framework for Interference Avoidance in Ad hoc Networks
It is shown in this paper that direct extensions of distributed greedy Interference Avoidance (IA) techniques for networks with centralized receivers to networks with multiple unc...
Rekha Menon, Allen B. MacKenzie, R. Michael Buehre...
SPAA
2005
ACM
15 years 9 months ago
Name independent routing for growth bounded networks
A weighted undirected network is ∆ growth-bounded if the number of nodes at distance 2r around any given node is at most ∆ times the number of nodes at distance r around the n...
Ittai Abraham, Dahlia Malkhi
205
Voted
COMPLEXITY
2010
173views more  COMPLEXITY 2010»
14 years 10 months ago
Signal-regulated systems and networks
The paper presents the use of signal regulatory networks, a biologically-inspired model based on gene regulatory networks. Signal regulatory networks are a way of understanding a ...
Terence L. van Zyl, Elizabeth Marie Ehlers
151
Voted
ICICS
2010
Springer
15 years 1 months ago
Efficient Authentication for Mobile and Pervasive Computing
With today's technology, many applications rely on the existence of small devices that can exchange information and form communication networks. In a significant portion of su...
Basel Alomair, Radha Poovendran