Sciweavers

5813 search results - page 1028 / 1163
» Sensor Networks
Sort
View
139
Voted
CCS
2008
ACM
15 years 4 months ago
Efficient security primitives derived from a secure aggregation algorithm
By functionally decomposing a specific algorithm (the hierarchical secure aggregation algorithm of Chan et al. [3] and Frikken et al. [7]), we uncover a useful general functionali...
Haowen Chan, Adrian Perrig
126
Voted
TON
2008
109views more  TON 2008»
15 years 2 months ago
Efficient routing in intermittently connected mobile networks: the single-copy case
Abstract--Intermittently connected mobile networks are wireless networks where most of the time there does not exist a complete path from the source to the destination. There are m...
Thrasyvoulos Spyropoulos, Konstantinos Psounis, Ca...
150
Voted
TON
2008
107views more  TON 2008»
15 years 2 months ago
Efficient routing in intermittently connected mobile networks: the multiple-copy case
Abstract--Intermittently connected mobile networks are wireless networks where most of the time there does not exist a complete path from the source to the destination. There are m...
Thrasyvoulos Spyropoulos, Konstantinos Psounis, Ca...
147
Voted
SMC
2007
IEEE
224views Control Systems» more  SMC 2007»
15 years 9 months ago
Complex networks as control paradigm for complex systems
—Rooted in a deep understanding of their major properties, a control paradigm for complex systems is proposed based on latest advances in modeling the dynamics of complex network...
Stefan Grobbelaar, Mihaela Ulieru
EWSN
2009
Springer
16 years 3 months ago
Sundial: Using Sunlight to Reconstruct Global Timestamps
Abstract. This paper investigates postmortem timestamp reconstruction in environmental monitoring networks. In the absence of a timesynchronization protocol, these networks use mul...
Jayant Gupchup, Razvan Musaloiu-Elefteri, Alexande...
« Prev « First page 1028 / 1163 Last » Next »