Sciweavers

832 search results - page 152 / 167
» Secure Node Discovery in Ad-hoc Networks and Applications
Sort
View
WCNC
2008
IEEE
15 years 3 months ago
On the Distribution of Positioning Errors in Wireless Sensor Networks: A Simulative Comparison of Optimization Algorithms
Abstract—Recent advances in the technology of wireless electronic devices have made possible to build ad–hoc Wireless Sensor Networks (WSNs) using inexpensive nodes consisting ...
Stefano Tennina, Marco Di Renzo, Fortunato Santucc...
CAINE
2008
14 years 11 months ago
Towards Multiservice Sensor Networks
Sensor networks have been used in many applications such as health monitoring, structural monitoring, transportation networks, weather prediction, and border security. In most of ...
Rabie Ramadan, Bilal I. AlQudah
SP
2009
IEEE
144views Security Privacy» more  SP 2009»
15 years 4 months ago
De-anonymizing Social Networks
Operators of online social networks are increasingly sharing potentially sensitive information about users and their relationships with advertisers, application developers, and da...
Arvind Narayanan, Vitaly Shmatikov
JPDC
2006
81views more  JPDC 2006»
14 years 9 months ago
Implications of virtualization on Grids for high energy physics applications
The simulations used in the field of high energy physics are compute intensive and exhibit a high level of data parallelism. These features make such simulations ideal candidates ...
Laura Gilbert, Jeff Tseng, Rhys Newman, Saeed Iqba...
108
Voted
PERCOM
2010
ACM
14 years 7 months ago
ReSCo: A middleware component for Reliable Service Composition in pervasive systems
Abstract—Service composition schemes create high-level application services by combining several basic services. Service composition schemes for dynamic, open systems, such as th...
Brent Lagesse, Mohan Kumar, Matthew Wright