Sciweavers

1389 search results - page 245 / 278
» Predicting and Evaluating Distributed Communication Performa...
Sort
View
MOBIQUITOUS
2005
IEEE
15 years 7 months ago
Practical Broadcast Authentication in Sensor Networks
Broadcast authentication is a critical security service in sensor networks; it allows a sender to broadcast messages to multiple nodes in an authenticated way. µTESLA and multi-l...
Donggang Liu, Peng Ning, Sencun Zhu, Sushil Jajodi...
SENSYS
2005
ACM
15 years 7 months ago
CenWits: a sensor-based loosely coupled search and rescue system using witnesses
This paper describes the design, implementation and evaluation of a search and rescue system called CenWits. CenWits uses several small, commonly-available RF-based sensors, and a...
Jyh-How Huang, Saqib Amjad, Shivakant Mishra
SIGECOM
2005
ACM
118views ECommerce» more  SIGECOM 2005»
15 years 7 months ago
Content availability, pollution and poisoning in file sharing peer-to-peer networks
Copyright holders have been investigating technological solutions to prevent distribution of copyrighted materials in peer-to-peer file sharing networks. A particularly popular t...
Nicolas Christin, Andreas S. Weigend, John Chuang
EUROPAR
2005
Springer
15 years 7 months ago
Developing Java Grid Applications with Ibis
Ibis1 is a programming environment for the development of grid applications in Java. We aim to support a wide range of applications and parallel platforms, so our example programs ...
Kees van Reeuwijk, Rob van Nieuwpoort, Henri E. Ba...
DMSN
2004
ACM
15 years 7 months ago
A framework for spatio-temporal query processing over wireless sensor networks
Wireless sensor networks consist of nodes with the ability to measure, store, and process data, as well as to communicate wirelessly with nodes located in their wireless range. Us...
Alexandru Coman, Mario A. Nascimento, Jörg Sa...