Sciweavers

3031 search results - page 322 / 607
» SNMS - Shadow Network Management System
Sort
View
SECURWARE
2008
IEEE
15 years 11 months ago
A Body-Centered Cubic Method for Key Agreement in Dynamic Mobile Ad Hoc Networks
Mobile ad hoc networking is an operating mode for rapid mobile host interconnection, where nodes rely on each other, in order to maintain network connectivity and functionality. S...
Ioannis G. Askoxylakis, Damien Sauveron, Constanti...
ACSC
2007
IEEE
15 years 11 months ago
QUIP: A Protocol For Securing Content in Peer-To-Peer Publish/Subscribe Overlay Networks
Publish/subscribe networks provide an interface for publishers to perform many-to-many communication to subscribers without the inefficiencies of broadcasting. Each subscriber sub...
Amy Beth Corman, Peter Schachte, Vanessa Teague
FBIT
2007
IEEE
15 years 11 months ago
Adaptive Data Dissemination in Sensor Networks Using WPDD
In Wireless Sensor Networks (WSNs), address-based routing approaches often lead to severe problems due to node mobility, energy-saving sleep-cycles, and often missing or unreliabl...
Falko Dressler, Reinhard German, Bettina Krüg...
SASN
2005
ACM
15 years 10 months ago
Defending against path-based DoS attacks in wireless sensor networks
Denial of service (DoS) attacks can cause serious damage in resourceconstrained, wireless sensor networks (WSNs). This paper addresses an especially damaging form of DoS attack, c...
Jing Deng, Richard Han, Shivakant Mishra
IPSN
2003
Springer
15 years 10 months ago
Meteorology and Hydrology in Yosemite National Park: A Sensor Network Application
Over half of California’s water supply comes from high elevations in the snowmelt-dominated Sierra Nevada. Natural climate fluctuations, global warming, and the growing needs of ...
Jessica D. Lundquist, Daniel R. Cayan, Michael D. ...