Sciweavers

1510 search results - page 184 / 302
» Secure Distributed Data Aggregation
Sort
View
LCN
2008
IEEE
15 years 8 months ago
Spatially Disjoint Multipath Routing protocol without location information
—Multipath routing permits the discovery and use of multiple paths between a source and a destination. We develop a distributed on-demand multipath routing protocol for MANETs ca...
Juan Jose Galvez, Pedro M. Ruiz, Antonio F. G&oacu...
150
Voted
AGENTS
2001
Springer
15 years 7 months ago
A fuzzy model of reputation in multi-agent systems
Agents are intended to interact in open systems where the knowledge about others (reputation) is incomplete and uncertain. Also, this knowledge about other agents is subjective si...
Javier Carbo Rubiera, José M. Molina L&oacu...
CCECE
2009
IEEE
15 years 7 months ago
Cluster head selection using RF signal strength
The LEACH algorithm for selecting cluster heads is a probabilistic method which produces clusters with a large variation of link distances and uneven energy consumption during the...
Scott Fazackerley, Alan Paeth, Ramon Lawrence
140
Voted
IPSN
2010
Springer
15 years 4 months ago
Information processing for live photo mosaic with a group of wireless image sensors
Photo tourism [11] is a platform that allows users to transform unstructured online digital photos into a 3D experience. Nowadays, image sensors are being extensively used to allo...
Fulu Li, James Barabas, Ana L. Santos
105
Voted
ACSAC
2002
IEEE
15 years 7 months ago
Protecting Web Usage of Credit Cards Using One-Time Pad Cookie Encryption
The blooming e-commerce is demanding better methods to protect online users' privacy, especially the credit card information that is widely used in online shopping. Holding a...
Donghua Xu, Chenghuai Lu, André L. M. dos S...