Sciweavers

832 search results - page 114 / 167
» Secure Node Discovery in Ad-hoc Networks and Applications
Sort
View
MOBICOM
2004
ACM
15 years 4 months ago
Revisiting the TTL-based controlled flooding search: optimality and randomization
In this paper we consider the problem of searching for a node or an object (i.e., piece of data, file, etc.) in a large network. Applications of this problem include searching fo...
Nicholas B. Chang, Mingyan Liu
STORAGESS
2005
ACM
15 years 4 months ago
Toward a threat model for storage systems
The growing number of storage security breaches as well as the need to adhere to government regulations is driving the need for greater storage protection. However, there is the l...
Ragib Hasan, Suvda Myagmar, Adam J. Lee, William Y...
EWSN
2010
Springer
15 years 2 months ago
An Adaptive Strategy for Energy-Efficient Data Collection in Sparse Wireless Sensor Networks
Sparse wireless sensor networks (WSNs) are being effectively used in several applications, which include transportation, urban safety, environment monitoring, and many others. Sens...
Mario Di Francesco, Kunal Shah, Mohan Kumar, Giuse...
GRID
2006
Springer
14 years 11 months ago
YA: Fast and Scalable Discovery of Idle CPUs in a P2P network
Discovery of large amounts of idle CPUs in fully distributed and shared Grid systems is needed in relevant applications and is still a challenging problem. In this paper we present...
Javier Celaya, Unai Arronategui
IPSN
2005
Springer
15 years 4 months ago
Attack-resistant location estimation in sensor networks
— Many sensor network applications require sensors’ locations to function correctly. Despite the recent advances, location discovery for sensor networks in hostile environments...
Donggang Liu, Peng Ning, Wenliang Du