Sciweavers

573 search results - page 71 / 115
» Some sensor network elements for ubiquitous computing
Sort
View
SASN
2005
ACM
15 years 9 months ago
The security of vehicular ad hoc networks
Vehicular networks are likely to become the most relevant form of mobile ad hoc networks. In this paper, we address the security of these networks. We provide a detailed threat an...
Maxim Raya, Jean-Pierre Hubaux
ICDCS
2010
IEEE
15 years 6 months ago
Distributed Coverage in Wireless Ad Hoc and Sensor Networks by Topological Graph Approaches
Abstract—Coverage problem is a fundamental issue in wireless ad hoc and sensor networks. Previous techniques for coverage scheduling often require accurate location information o...
Dezun Dong, Yunhao Liu, Kebin Liu, Xiangke Liao
140
Voted
HICSS
1999
IEEE
111views Biometrics» more  HICSS 1999»
15 years 8 months ago
T Spaces: The Next Wave
Millions of small heterogeneous computers are poised to spread into the infrastructure of our society. Though mostly inconspicuous today, disguised as nothing more than PIM (perso...
Tobin J. Lehman, Stephen W. McLaughry, Peter Wycko...
IBMSJ
1998
81views more  IBMSJ 1998»
15 years 3 months ago
T Spaces
Millions of small heterogeneous computers are poised to spread into the infrastructure of our society. Though mostly inconspicuous today, disguised as nothing more than PIM (perso...
Peter Wyckoff, Stephen W. McLaughry, Tobin J. Lehm...
MOBIHOC
2005
ACM
16 years 3 months ago
An efficient scheme for authenticating public keys in sensor networks
With the advance of technology, Public Key Cryptography (PKC) will sooner or later be widely used in wireless sensor networks. Recently, it has been shown that the performance of ...
Wenliang Du, Ronghua Wang, Peng Ning