Sciweavers

1030 search results - page 48 / 206
» Protocols Using Anonymous Connections: Mobile Applications
Sort
View
CORR
2010
Springer
176views Education» more  CORR 2010»
15 years 5 months ago
Abstraction for Epistemic Model Checking of Dining Cryptographers-based Protocols
ion for Epistemic Model Checking of Dining Cryptographers-based Protocols Omar I. Al-Bataineh and Ron van der Meyden School of Computer Science and Engineering, University of New S...
Omar I. Al-Bataineh, Ron van der Meyden
139
Voted
NOMS
2006
IEEE
15 years 11 months ago
System Support for Management of Networked Low-Power Sensors
— This paper addresses the problem of managing a wireless sensor network with mobile managers. The mobile managers should be able to create their connectivity to the nodes they m...
Jai-Jin Lim, Daniel L. Kiskis, Kang G. Shin
176
Voted
IWCMC
2006
ACM
15 years 11 months ago
Optimal hierarchical energy efficient design for MANETs
Due to the growing interest in mobile wireless Ad-Hoc networks’ (MANETs) applications, researchers have proposed many routing protocols that differ in their objective. Energy ef...
Wasim El-Hajj, Dionysios Kountanis, Ala I. Al-Fuqa...
153
Voted
ICTAC
2005
Springer
15 years 10 months ago
Stochastic Analysis of Graph Transformation Systems: A Case Study in P2P Networks
In distributed and mobile systems with volatile bandwidth and fragile connectivity, non-functional aspects like performance and reliability become more and more important. To forma...
Reiko Heckel
151
Voted
CCS
2011
ACM
14 years 5 months ago
Privacy and accountability for location-based aggregate statistics
A significant and growing class of location-based mobile applications aggregate position data from individual devices at a server and compute aggregate statistics over these posi...
Raluca A. Popa, Andrew J. Blumberg, Hari Balakrish...