Sciweavers

6122 search results - page 1053 / 1225
» Securing network access in wireless sensor networks
Sort
View
ICWE
2010
Springer
14 years 8 months ago
Mashing Up Your Web-Enabled Home
Many efforts are currently going towards networking smart things from the physical world (e.g. RFID, wireless sensor and actuator networks, embedded devices) on a larger scale. Rat...
Dominique Guinard
COMPSYSTECH
2009
14 years 8 months ago
Architectural models for realization of web-based personal health systems
: Recent advances in Information and Communication Technologies (ICT) and more specifically in wireless networks and mobile computing have driven new directions in the development ...
Mitko Shopov, Grisha Spasov, Galidia Petrova
MOBIHOC
2006
ACM
15 years 9 months ago
Topology control meets SINR: : the scheduling complexity of arbitrary topologies
To date, topology control in wireless ad hoc and sensor networks--the study of how to compute from the given communication network a subgraph with certain beneficial properties--h...
Thomas Moscibroda, Roger Wattenhofer, Aaron Zollin...
81
Voted
JMLR
2006
113views more  JMLR 2006»
14 years 10 months ago
On Inferring Application Protocol Behaviors in Encrypted Network Traffic
Several fundamental security mechanisms for restricting access to network resources rely on the ability of a reference monitor to inspect the contents of traffic as it traverses t...
Charles V. Wright, Fabian Monrose, Gerald M. Masso...
95
Voted
VTC
2010
IEEE
195views Communications» more  VTC 2010»
14 years 8 months ago
Efficiency of Distributed Compression and Its Dependence on Sensor Node Deployments
Abstract--In this paper we analyze the energy-efficiency of distributed compression and its dependence on the node deployment strategies for Wireless Sensor Networks (WSNs). Reduce...
Frank Oldewurtel, Janne Riihijärvi, Petri M&a...
« Prev « First page 1053 / 1225 Last » Next »