Sciweavers

1862 search results - page 367 / 373
» Routing and Security in Mobile Ad Hoc Networks
Sort
View
SENSYS
2006
ACM
15 years 3 months ago
Data compression algorithms for energy-constrained devices in delay tolerant networks
Sensor networks are fundamentally constrained by the difficulty and energy expense of delivering information from sensors to sink. Our work has focused on garnering additional si...
Christopher M. Sadler, Margaret Martonosi
MOBIHOC
2008
ACM
15 years 9 months ago
Using persistent homology to recover spatial information from encounter traces
In order to better understand human and animal mobility and its potential effects on Mobile Ad-Hoc networks and Delay-Tolerant Networks, many researchers have conducted experiment...
Brenton D. Walker
82
Voted
STORAGESS
2005
ACM
15 years 3 months ago
Toward a threat model for storage systems
The growing number of storage security breaches as well as the need to adhere to government regulations is driving the need for greater storage protection. However, there is the l...
Ragib Hasan, Suvda Myagmar, Adam J. Lee, William Y...
94
Voted
LISA
2003
14 years 11 months ago
Three Practical Ways to Improve Your Network
This paper presents three simple techniques for improving network service using relatively unknown features of many existing networks. The resulting system provides greater reliab...
Kevin Miller
IEEEIAS
2008
IEEE
15 years 4 months ago
Geolocation-Based Trust for Vanet's Privacy
: Research in Vehicular Ad Hoc NETworks (VANETs) has evolved considerably over the last years. Security and privacy in VANETs have recently appealed special interest in the researc...
Jetzabel Serna, Jesus Luna, Manel Medina