Sciweavers

2047 search results - page 337 / 410
» Pervasive Computing on Active Networks
Sort
View
ISPA
2005
Springer
15 years 9 months ago
Hybrid Authentication and Key Management Scheme for WSANs
:Wireless Sensor and Actor Networks (WSANs) consist of three types of nodes with different capabilities and functions. Because of these heterogeneities, current network security ...
Xiaomei Cao, Mao Lin Huang, YueQuan Chen, Guihai C...
141
Voted
ISCAS
2002
IEEE
108views Hardware» more  ISCAS 2002»
15 years 9 months ago
Optimal adaptive bandwidth monitoring for QoS based retrieval
—Network aware multimedia delivery applications are a class of applications that provide certain level of quality of service (QoS) guarantees to end users while not assuming unde...
Yinzhe Yu, Anup Basu, Irene Cheng
WMTE
2002
IEEE
15 years 9 months ago
To Unlock the Learning Value of Wireless Mobile Devices, Understand Coupling
Handheld computers will become an increasingly compelling choice of technology for K-12 classrooms because they will enable a transition from occasional, supplemental use to frequ...
Jeremy Roschelle, Charles Patton, Roy D. Pea
ATAL
2008
Springer
15 years 6 months ago
Max-sum decentralised coordination for sensor systems
A key challenge for the successful deployment of systems consisting of multiple autonomous networked sensors is the development of decentralised mechanisms to coordinate the activ...
W. T. Luke Teacy, Alessandro Farinelli, N. J. Grab...
CCS
2009
ACM
16 years 4 months ago
Automating analysis of large-scale botnet probing events
Botnets dominate today's attack landscape. In this work we investigate ways to analyze collections of malicious probing traffic in order to understand the significance of lar...
Zhichun Li, Anup Goyal, Yan Chen, Vern Paxson