Sciweavers

4985 search results - page 236 / 997
» Re-Configurable Computing in Wireless
Sort
View
ICCSA
2005
Springer
15 years 10 months ago
On the Security of Wireless Sensor Networks
Wireless Sensor Networks are extremely vulnerable against any kind of internal or external attacks, due to several factors such as resource-constrained nodes and lack of tamper-res...
Rodrigo Roman, Jianying Zhou, Javier Lopez
PERVASIVE
2004
Springer
15 years 9 months ago
A Fault-Tolerant Key-Distribution Scheme for Securing Wireless Ad Hoc Networks
We propose a novel solution for securing wireless ad-hoc networks. Our goal is to provide secure key exchange in the presence of device failures and denial-of-service attacks. The ...
Arno Wacker, Timo Heiber, Holger Cermann, Pedro Jo...
EDOC
2000
IEEE
15 years 8 months ago
Wireless Java RMI
Due to its high protocol overhead, both in data traffic and in round-trips, Java RMI is poorly suited for communication over slow wireless links. However, its performance can be ...
Stefano Campadello, Oskari Koskimies, Kimmo E. E. ...
ITICSE
2010
ACM
15 years 4 months ago
Hands-on approach to teaching wireless sensor networks at the undergraduate level
Teaching wireless sensor networks (WSNs) at the undergraduate level is both challenging and rewarding. WSNs include low-level programming and debugging, power-aware operations, no...
Anna Förster, Mehdi Jazayeri
IPPS
2007
IEEE
15 years 10 months ago
Distributed, Reliable Restoration Techniques using Wireless Sensor Devices
Wireless sensor networks are small, inexpensive and flexible computational platforms, that have found popular applications in various areas including environmental monitoring, he...
Yannis Drougas, Vana Kalogeraki