Sciweavers

576 search results - page 103 / 116
» Overview the Key Management in Ad Hoc Networks
Sort
View
ICDE
2010
IEEE
258views Database» more  ICDE 2010»
15 years 6 months ago
Anonymized Data: Generation, models, usage
Data anonymization techniques have been the subject of intense investigation in recent years, for many kinds of structured data, including tabular, item set and graph data. They e...
Graham Cormode, Divesh Srivastava
SAC
2009
ACM
15 years 6 months ago
A passive conformance testing approach for a MANET routing protocol
In this paper we propose a passive conformance testing technique applied to a Mobile ad hoc network (MANET) routing protocol, OLSR, that is characterized by a dynamically changing...
Ana R. Cavalli, Stéphane Maag, Edgardo Mont...
COORDINATION
2008
Springer
15 years 1 months ago
CiAN: A Workflow Engine for MANETs
Most mature workflow management systems (WfMSs) available today execute workflows via orchestration of an available set of services, a process in which a central coordinating enti...
Rohan Sen, Gruia-Catalin Roman, Christopher D. Gil...
NBIS
2009
Springer
15 years 6 months ago
Improving the Robustness of Wireless Device Pairing Using Hyphen-Delimited Numeric Comparison
Abstract—The operation of achieving authenticated key agreement between two human-operated mobile devices over a short range wireless communication channel, such as Bluetooth or ...
Ambarish Karole, Nitesh Saxena
GLVLSI
2007
IEEE
189views VLSI» more  GLVLSI 2007»
15 years 6 months ago
Hardware-accelerated path-delay fault grading of functional test programs for processor-based systems
The path-delay fault simulation of functional tests on complex circuits such as current processor-based systems is a daunting task. The amount of computing power and memory needed...
Paolo Bernardi, Michelangelo Grosso, Matteo Sonza ...