Sciweavers

1051 search results - page 13 / 211
» Secure Continuity for Sensor Networks
Sort
View
108
Voted
SAC
2011
ACM
14 years 10 days ago
Secure shared continuous query processing
Data stream management systems (DSMSs) process continuous queries over streaming data in real-time adhering to quality of service requirements. The data streams generated from sen...
Raman Adaikkalavan, Thomas Perez
ICDCS
2009
IEEE
15 years 6 months ago
Protecting Neighbor Discovery Against Node Compromises in Sensor Networks
The neighborhood information has been frequently used by protocols such as routing in sensor networks. Many methods have been proposed to protect such information in hostile envir...
Donggang Liu
CANS
2009
Springer
165views Cryptology» more  CANS 2009»
15 years 4 months ago
Blink 'Em All: Scalable, User-Friendly and Secure Initialization of Wireless Sensor Nodes
Abstract. Wireless sensor networks have several useful applications in commercial and defense settings, as well as user-centric personal area networks. To establish secure (point-t...
Nitesh Saxena, Md. Borhan Uddin
78
Voted
DMTCS
2010
416views Mathematics» more  DMTCS 2010»
14 years 7 months ago
Continued fraction expansions for q-tangent and q-cotangent functions
Abstract. For 3 different versions of q-tangent resp. q-cotangent functions, we compute the continued fraction expansion explicitly, by guessing the relative quantities and proving...
Helmut Prodinger
94
Voted
SASN
2005
ACM
15 years 3 months ago
Coordinated sensor deployment for improving secure communications and sensing coverage
Sensor network has a great potential in applications such as habitat monitoring, wildlife tracking, building surveillance, and military combat. The design of a sensor network syst...
Yinian Mao, Min Wu