Sciweavers

1992 search results - page 297 / 399
» On the (limited) power of non-equivocation
Sort
View
111
Voted
TMC
2010
124views more  TMC 2010»
15 years 4 days ago
A Scalable and Energy-Efficient Context Monitoring Framework for Mobile Personal Sensor Networks
—The key feature of many emerging pervasive computing applications is to proactively provide services to mobile individuals. One major challenge in providing users with proactive...
Seungwoo Kang, Jinwon Lee, Hyukjae Jang, Youngki L...
WINET
2010
179views more  WINET 2010»
15 years 3 days ago
Achieving robust message authentication in sensor networks: a public-key based approach
Given the extremely limited hardware resources on sensor nodes and the inclement deploying environment, the adversary Denial-of-Service (DoS) attack becomes a serious security thre...
Haodong Wang, Qun Li
145
Voted
WIOPT
2010
IEEE
15 years 3 days ago
Fractional frequency reuse and interference suppression for OFDMA networks
—The downlink performance of cellular networks is known to be strongly limited by inter-cell interference. In order to mitigate this interference, a number of frequency reuse sch...
Rizwan Ghaffar, Raymond Knopp
113
Voted
AR
2010
133views more  AR 2010»
15 years 3 days ago
Coordinated Control of Space Robot Teams for the On-Orbit Construction of Large Flexible Space Structures
Teams of autonomous space robots are needed for future space missions such as the construction of large solar power stations and large space telescopes in earth orbit. This work fo...
Peggy Boning, Steven Dubowsky
CORR
2010
Springer
152views Education» more  CORR 2010»
15 years 2 days ago
A new key establishment scheme for wireless sensor networks
Traditional key management techniques, such as public key cryptography or key distribution center (e.g., Kerberos), are often not effective for wireless sensor networks for the se...
Eric Ke Wang, Lucas Chi Kwong Hui, Siu-Ming Yiu