Sciweavers

4189 search results - page 766 / 838
» On the Security of Wireless Sensor Networks
Sort
View
ADHOCNETS
2009
Springer
15 years 4 months ago
MeshMAC: Enabling Mesh Networking over IEEE 802.15.4 through Distributed Beacon Scheduling
Although IEEE 802.15.4 is being considered as a promising standard for low-cost low-power Wireless Sensor Networks (WSNs), several issues in the specification are still open. One o...
Panneer Muthukumaran, Rodolfo de Paz Alberola, Ros...
PEWASUN
2004
ACM
15 years 3 months ago
A routing protocol for power constrained networks with asymmetric links
In many instances, an ad hoc network consists of nodes with different hardware and software capabilities as well as power limitations. This is the case of ad hoc grids where devi...
Guoqiang Wang, Yongchang Ji, Dan C. Marinescu, Dam...
OTM
2004
Springer
15 years 3 months ago
Towards a Peer-to-Peer Event Broker Grid in a Hybrid Network Environment
Peer-to-peer networks and grids offer promising paradigms for developing efficient distributed systems and applications. Event-based middleware is becoming a core architectural el...
Eiko Yoneki, Jean Bacon
DEXA
2010
Springer
182views Database» more  DEXA 2010»
14 years 10 months ago
Minimum Spanning Tree on Spatio-Temporal Networks
Given a spatio-temporal network (ST network) whose edge properties vary with time, a time-sub-interval minimum spanning tree (TSMST) is a collection of distinct minimum spanning t...
Viswanath Gunturi, Shashi Shekhar, Arnab Bhattacha...
ACSC
2004
IEEE
15 years 1 months ago
Kerberos Assisted Authentication in Mobile Ad-hoc Networks
An ad-hoc network comprises mobile nodes that cooperate with each other using wireless connections to route both data and control packets within the network. As the low transmissi...
Asad Amir Pirzada, Chris McDonald