Sciweavers

3426 search results - page 637 / 686
» Self-Protection for Wireless Sensor Networks
Sort
View
IWCMC
2006
ACM
15 years 5 months ago
Modeling key agreement in multi-hop ad hoc networks
Securing multicast communications in ad hoc networks has become one of the most challenging research directions in the areas of wireless networking and security. This is especiall...
Giovanni Di Crescenzo, Maria Striki, John S. Baras
IPSN
2009
Springer
15 years 6 months ago
Poster abstract: Enabling reliable and high-fidelity data center sensing
bstract: Enabling Reliable and High-Fidelity Data Center Sensing Chieh-Jan Mike Liang† , Jie Liu‡ , Liqian Luo , Andreas Terzis† † Johns Hopkins University ‡ Microsoft Re...
Chieh-Jan Mike Liang, Jie Liu, Liqian Luo, Andreas...
SENSYS
2003
ACM
15 years 5 months ago
Matching data dissemination algorithms to application requirements
A distinguishing characteristic of wireless sensor networks is the opportunity to exploit characteristics of the application at lower layers. This approach is encouraged by device...
John S. Heidemann, Fabio Silva, Deborah Estrin
EWSN
2006
Springer
15 years 11 months ago
f-MAC: A Deterministic Media Access Control Protocol Without Time Synchronization
Nodes in a wireless network transmit messages through a shared medium. Thus, a Media Access Control (MAC) protocol is necessary to regulate and coordinate medium access. For some a...
André M. Barroso, Cormac J. Sreenan, Utz Ro...
CHI
2005
ACM
16 years 7 days ago
Giving the caller the finger: collaborative responsibility for cellphone interruptions
We present a system in which a cell phone decides whether to ring by accepting votes from the others in a conversation with the called party. When a call comes in, the phone first...
Stefan Marti, Chris Schmandt