Sciweavers

1251 search results - page 200 / 251
» On the security of group communication schemes
Sort
View
ACISP
2001
Springer
15 years 6 months ago
A Practical English Auction with One-Time Registration
An English auction is the most familiar type of auctions. Generally, an electronic auction has mainly two entities, the registration manager(RM) who treats the registration of bidd...
Kazumasa Omote, Atsuko Miyaji
SCL
2010
137views more  SCL 2010»
15 years 10 days ago
Cooperative distributed model predictive control
— Cooperative distributed model predictive control has recently been shown to provide stabilizing feedback for plants composed of any finite number of dynamically coupled subsys...
Brett T. Stewart, Aswin N. Venkat, James B. Rawlin...
VLDB
2004
ACM
152views Database» more  VLDB 2004»
16 years 2 months ago
Balancing energy efficiency and quality of aggregate data in sensor networks
In-network aggregation has been proposed as one method for reducing energy consumption in sensor networks. In this paper, we explore two ideas related to further reducing energy co...
Mohamed A. Sharaf, Jonathan Beaver, Alexandros Lab...
TPDS
2008
80views more  TPDS 2008»
15 years 1 months ago
Scalable and Efficient End-to-End Network Topology Inference
To construct an efficient overlay network, the information of underlay is important. We consider using end-to-end measurement tools such as traceroute to infer the underlay topolog...
Xing Jin, Wanqing Tu, S.-H. Gary Chan
ICDCS
2008
IEEE
15 years 8 months ago
Real-Time Detection of Clone Attacks in Wireless Sensor Networks
A central problem in sensor network security is that sensors are susceptible to physical capture attacks. Once a sensor is compromised, the adversary can easily launch clone attac...
Kai Xing, Fang Liu, Xiuzhen Cheng, David Hung-Chan...