Sciweavers

1140 search results - page 153 / 228
» Simulation data exchange (SDX) implementation and use
Sort
View
VTC
2008
IEEE
15 years 6 months ago
Secure Vehicular Communication for Safety Applications - A Measurement Study
Abstract—In this paper, we explore the feasibility of vehicleto-vehicle (V2V) secure communication using public key cryptography. We implement a prototype and test it extensively...
Juhong Min, Jihun Ha, Sangki Yun, Inhye Kang, Hyog...
ACISICIS
2007
IEEE
15 years 6 months ago
A Comparative Study on the Performance of Wireless Sensor Networks
To increase the lifetime of the sensor networks, a recognized method is to switch off/on some sensor nodes between “sleep” and “activity” mode in order to save the energy....
Lin Zou, Zhongwei Zhang
P2P
2006
IEEE
119views Communications» more  P2P 2006»
15 years 5 months ago
Defense against Intrusion in a Live Streaming Multicast System
Application-level multicast systems are vulnerable to attacks that impede nodes from receiving desired data. Live streaming protocols are especially susceptible to packet loss ind...
Maya Haridasan, Robbert van Renesse
ROBIO
2006
IEEE
103views Robotics» more  ROBIO 2006»
15 years 5 months ago
Processing of an Embedded Tactile Matrix Sensor
— A fully embedded tactile/force sensor system to be installed on the phalanges of a robot hand is presented in this paper. The sensor consists of a distributed array of analog t...
Giorgio Cannata, Marco Maggiali
WDAG
2005
Springer
88views Algorithms» more  WDAG 2005»
15 years 5 months ago
Optimal Resilience for Erasure-Coded Byzantine Distributed Storage
We analyze the problem of efficient distributed storage of information in a message-passing environment where both less than one third of the servers, as well as an arbitrary num...
Christian Cachin, Stefano Tessaro