Sciweavers

1423 search results - page 233 / 285
» Secure and Efficient Data Collection in Sensor Networks
Sort
View
DSN
2007
IEEE
15 years 4 months ago
Concilium: Collaborative Diagnosis of Broken Overlay Routes
In a peer-to-peer overlay network, hosts cooperate to forward messages. When a message does not reach its final destination, there are two possible explanations. An intermediate ...
James W. Mickens, Brian D. Noble
PERCOM
2005
ACM
15 years 9 months ago
Security Parallels between People and Pervasive Devices
Unique and challenging security problems arise due to the scarcity of computational, storage, and power resources in the low-cost pervasive computing environment. Particularly rel...
Stephen A. Weis
TMA
2010
Springer
150views Management» more  TMA 2010»
14 years 7 months ago
Validation and Improvement of the Lossy Difference Aggregator to Measure Packet Delays
One-way packet delay is an important network performance metric. Recently, a new data structure called Lossy Difference Aggregator (LDA) has been proposed to estimate this metric m...
Josep Sanjuàs-Cuxart, Pere Barlet-Ros, Jose...
ESAS
2004
Springer
15 years 1 months ago
Advanced Detection of Selfish or Malicious Nodes in Ad Hoc Networks
Abstract. The fact that security is a critical problem when implementing mobile ad hoc networks (MANETs) is widely acknowledged. One of the different kinds of misbehavior a node ma...
Frank Kargl, Andreas Klenk, Stefan Schlott, Michae...
AROBOTS
2004
127views more  AROBOTS 2004»
14 years 9 months ago
Distributed, Physics-Based Control of Swarms of Vehicles
We introduce a framework, called "physicomimetics," that provides distributed control of large collections of mobile physical agents in sensor networks. The agents sense...
William M. Spears, Diana F. Spears, Jerry C. Haman...