Sciweavers

1748 search results - page 200 / 350
» Security Models for Heterogeneous Networking
Sort
View
TMC
2010
158views more  TMC 2010»
15 years 2 months ago
Secure Distance-Based Localization in the Presence of Cheating Beacon Nodes
—Secure distance-based localization in the presence of cheating beacon (or anchor) nodes is an important problem in mobile wireless ad hoc and sensor networks. Despite significa...
Murtuza Jadliwala, Sheng Zhong, Shambhu J. Upadhya...
JMM2
2007
122views more  JMM2 2007»
15 years 3 months ago
Hierarchical Model-Based Activity Recognition With Automatic Low-Level State Discovery
Abstract— Activity recognition in video streams is increasingly important for both the computer vision and artificial intelligence communities. Activity recognition has many app...
Justin Muncaster, Yunqian Ma
143
Voted
GLOBECOM
2009
IEEE
15 years 10 months ago
Real-World VANET Security Protocol Performance
—Many results have been published in the literature based on performance measurements obtained from simulations of Vehicular Networks (VANETs). These simulations use as input tra...
Jason J. Haas, Yih-Chun Hu, Kenneth P. Laberteaux
ICDCS
2006
IEEE
15 years 10 months ago
Elastic Routing Table with Provable Performance for Congestion Control in DHT Networks
Distributed hash table (DHT) networks based on consistent hashing functions have an inherent load balancing problem. The problem becomes more severe due to the heterogeneity of ne...
Haiying Shen, Cheng-Zhong Xu
MOBIHOC
2002
ACM
16 years 3 months ago
On the minimum node degree and connectivity of a wireless multihop network
This paper investigates two fundamental characteristics of a wireless multihop network: its minimum node degree and its k?connectivity. Both topology attributes depend on the spat...
Christian Bettstetter