Sciweavers

1748 search results - page 138 / 350
» Security Models for Heterogeneous Networking
Sort
View
150
Voted
JNW
2006
149views more  JNW 2006»
15 years 3 months ago
Authenticated AODV Routing Protocol Using One-Time Signature and Transitive Signature Schemes
Mobile ad hoc network (MANET) has been generally regarded as an ideal network model for group communications because of its specialty of instant establishment. However, the securit...
Shidi Xu, Yi Mu, Willy Susilo
163
Voted
ICC
2011
IEEE
257views Communications» more  ICC 2011»
14 years 3 months ago
Increasing the Lifetime of Roadside Sensor Networks Using Edge-Betweenness Clustering
Abstract—Wireless Sensor Networks are proven highly successful in many areas, including military and security monitoring. In this paper, we propose a method to use the edge–bet...
Joakim Flathagen, Ovidiu Valentin Drugan, Paal E. ...
159
Voted
MATA
2004
Springer
199views Communications» more  MATA 2004»
15 years 9 months ago
Configuration Management for Networked Reconfigurable Embedded Devices
Distribution of product updates to embedded devices can increase product lifetimes for consumers and boost revenues for vendors. Dynamic provisioning of application solutions to e...
Timothy O'Sullivan, Richard Studdert
145
Voted
CMSB
2003
Springer
15 years 9 months ago
An Overview of Data Models for the Analysis of Biochemical Pathways
Biochemical pathways such as metabolic, regulatory or signal tranduction pathways can be viewed as interconnected processes forming an intricate network of functional and physical...
Yves Deville, David Gilbert, Jacques van Helden, S...
167
Voted
DSOM
1999
Springer
15 years 8 months ago
Derivation of Backup Service Management Applications from Service and System Models
The backup of large data sets is preferably performed automatically outside of regular working hours. In highly structured computer networks, however, faults and exceptions may rel...
Ingo Lück, Marcus Schönbach, Arnulf Mest...