Sciweavers

3009 search results - page 543 / 602
» On Communication Security in Wireless Ad-Hoc Sensor Networks
Sort
View
VTC
2006
IEEE
15 years 5 months ago
Proposition of a full deterministic medium access method for wireless network in a robotic application
—Today, many network applications require shorter react time. Robotic field is an excellent example of these needs: robot react time has a direct effect on its task’s complexit...
Adrien van den Bossche, Thierry Val, Eric Campo
ICC
2007
IEEE
170views Communications» more  ICC 2007»
15 years 6 months ago
Evaluating Techniques for Network Layer Independence in Cognitive Networks
— Cognitive networks are the latest progression of cognitive functionality into the networking stack, an effort which began with a layer one and two focus on cognitive radios, an...
Muthukumaran Pitchaimani, Benjamin J. Ewy, Joseph ...
WWIC
2004
Springer
139views Communications» more  WWIC 2004»
15 years 5 months ago
A Scalable and Adaptive Key Management Protocol for Group Communication
Abstract. Multicasting is increasingly used as an efficient communication mechanism for group-oriented applications in the Internet. In order to offer secrecy for multicast applic...
Yacine Challal, Hatem Bettahar, Abdelmadjid Bouabd...
GLOBECOM
2006
IEEE
15 years 5 months ago
Key Distribution in Mobile Heterogeneous Sensor Networks
— Key predistribution is a popular technique for key distribution in sensor networks. The schemes available in current literature using this approach are for nodes with no or lim...
Arjan Durresi, Vijay Bulusu, Vamsi Paruchuri, Mimo...
IS
2011
14 years 3 months ago
Collection trees for event-monitoring queries
In this paper we present algorithms for building and maintaining efficient collection trees that provide the conduit to disseminate data required for processing monitoring queries...
Antonios Deligiannakis, Yannis Kotidis, Vassilis S...