Sciweavers

1748 search results - page 226 / 350
» Security Models for Heterogeneous Networking
Sort
View
IJCNN
2006
IEEE
15 years 9 months ago
Small-catchment flood forecasting and drainage network extraction using computational intelligence
— Forecast, detection and warning of severe weather and related hydro-geological risks is becoming one of the major issues for civil protection. The use of computational intellig...
Erika Coppola, Barbara Tomassetti, Marco Verdecchi...
141
Voted
IEEEARES
2008
IEEE
15 years 10 months ago
Fault Effects in FlexRay-Based Networks with Hybrid Topology
This paper investigates fault effects and error propagation in a FlexRay-based network with hybrid topology that includes a bus subnetwork and a star subnetwork. The investigation...
Mehdi Dehbashi, Vahid Lari, Seyed Ghassem Miremadi...
124
Voted
JNW
2008
99views more  JNW 2008»
15 years 3 months ago
Probabilistic Key Management Practical Concerns in Wireless Sensor Networks
The subject of Key Management in Wireless Sensor Networks has gained increased attention from the security community around the world in the last years. Several proposals were made...
Rui Miguel Soares Silva, Nuno Sidónio A. Pe...
111
Voted
ACNS
2009
Springer
143views Cryptology» more  ACNS 2009»
15 years 10 months ago
A New Message Recognition Protocol with Self-recoverability for Ad Hoc Pervasive Networks
Abstract. We examine the problem of message recognition by reviewing the definitions and the security model in the literature. In particular, we examine the Jane Doe protocol, whi...
Ian Goldberg, Atefeh Mashatan, Douglas R. Stinson
EUROPAR
2007
Springer
15 years 9 months ago
Surrendering Autonomy: Can Cooperative Mobility Help?
In this paper, we develop a Cooperative Mobility Model that captures new salient features of collaborative and mission-oriented MANETs. In particular, the cost-benefit framework o...
Ghassen Ben Brahim, Bilal Khan, Ala I. Al-Fuqaha, ...