Sciweavers

1423 search results - page 233 / 285
» Secure and Efficient Data Collection in Sensor Networks
Sort
View
DSN
2007
IEEE
15 years 6 months ago
Concilium: Collaborative Diagnosis of Broken Overlay Routes
In a peer-to-peer overlay network, hosts cooperate to forward messages. When a message does not reach its final destination, there are two possible explanations. An intermediate ...
James W. Mickens, Brian D. Noble
PERCOM
2005
ACM
15 years 11 months ago
Security Parallels between People and Pervasive Devices
Unique and challenging security problems arise due to the scarcity of computational, storage, and power resources in the low-cost pervasive computing environment. Particularly rel...
Stephen A. Weis
TMA
2010
Springer
150views Management» more  TMA 2010»
14 years 9 months ago
Validation and Improvement of the Lossy Difference Aggregator to Measure Packet Delays
One-way packet delay is an important network performance metric. Recently, a new data structure called Lossy Difference Aggregator (LDA) has been proposed to estimate this metric m...
Josep Sanjuàs-Cuxart, Pere Barlet-Ros, Jose...
ESAS
2004
Springer
15 years 3 months ago
Advanced Detection of Selfish or Malicious Nodes in Ad Hoc Networks
Abstract. The fact that security is a critical problem when implementing mobile ad hoc networks (MANETs) is widely acknowledged. One of the different kinds of misbehavior a node ma...
Frank Kargl, Andreas Klenk, Stefan Schlott, Michae...
AROBOTS
2004
127views more  AROBOTS 2004»
14 years 11 months ago
Distributed, Physics-Based Control of Swarms of Vehicles
We introduce a framework, called "physicomimetics," that provides distributed control of large collections of mobile physical agents in sensor networks. The agents sense...
William M. Spears, Diana F. Spears, Jerry C. Haman...